<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Microsoft &#8211; First Hackers News</title>
	<atom:link href="https://firsthackersnews.com/category/microsoft/feed/" rel="self" type="application/rss+xml" />
	<link>https://firsthackersnews.com</link>
	<description>Latest cybersecurity news, real attacks, and practical IOCs—made simple and actionable.</description>
	<lastBuildDate>Tue, 31 Mar 2026 18:47:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://firsthackersnews.com/wp-content/uploads/2026/03/cropped-FHN_512x512-32x32.png</url>
	<title>Microsoft &#8211; First Hackers News</title>
	<link>https://firsthackersnews.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Windows 11 Blocks Untrusted Kernel Drivers to Improve Security</title>
		<link>https://firsthackersnews.com/windows-kernel-driver-security-update/</link>
					<comments>https://firsthackersnews.com/windows-kernel-driver-security-update/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Sun, 29 Mar 2026 05:22:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[windows]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#DriverSecurity]]></category>
		<category><![CDATA[#EndpointSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#KernelSecurity]]></category>
		<category><![CDATA[#Malware]]></category>
		<category><![CDATA[#Microsoft]]></category>
		<category><![CDATA[#Rootkit]]></category>
		<category><![CDATA[#SecureBoot]]></category>
		<category><![CDATA[#SecurityUpdate]]></category>
		<category><![CDATA[#ThreatProtection]]></category>
		<category><![CDATA[#Windows11]]></category>
		<category><![CDATA[#WindowsServer2025]]></category>
		<category><![CDATA[#WindowsUpdate]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11518</guid>

					<description><![CDATA[<p>Microsoft is introducing a major security improvement in Windows 11 and Windows Server 2025 by changing how kernel</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-kernel-driver-security-update/">Windows 11 Blocks Untrusted Kernel Drivers to Improve Security</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft is introducing a major security improvement in Windows 11 and Windows Server 2025 by changing how kernel drivers are trusted and loaded, significantly enhancing Windows kernel driver security. Starting with the April 2026 update, the operating system will block untrusted cross-signed kernel drivers by default.</p>



<p>This update ensures that only drivers verified through Microsoft’s Windows Hardware Compatibility Program (WHCP) are allowed to run automatically. By enforcing stricter validation, Microsoft is reducing the risk of attackers using malicious drivers to gain deep, kernel-level access to systems.</p>



<p>This enhancement is crucial for maintaining high standards of Windows kernel driver security across all devices.</p>



<p>Kernel drivers operate at the core of the operating system, so any weakness in how they are signed or validated can be exploited. By removing support for legacy signing methods, Microsoft is closing a long-standing security gap.</p>



<h2 class="wp-block-heading"><strong>Removal of Cross-Signed Drivers and Security Impact</strong></h2>



<p>The older cross-signing model allowed third-party certificate authorities to approve drivers without strict validation from Microsoft. While this approach helped with compatibility in the past, it also introduced security risks.</p>



<p>Attackers have historically abused this model by stealing signing keys and using them to install rootkits and other advanced malware. Even though Microsoft deprecated cross-signing in 2021, older certificates were still trusted by Windows systems until now.</p>



<p>With this update, that trust is fully removed. Drivers must now go through a stricter approval process that includes:</p>



<ul class="wp-block-list">
<li>Identity verification of the vendor</li>



<li>Security and compatibility testing</li>



<li>Malware scanning before certification</li>
</ul>



<p>This significantly reduces the chances of malicious drivers being loaded into the Windows kernel.</p>



<h2 class="wp-block-heading"><strong>Deployment Approach and Enterprise Considerations</strong></h2>



<p>To avoid disruptions, Microsoft is rolling out this change in stages. Initially, the system will monitor and evaluate driver activity before enforcing the block. This allows organizations to identify compatibility issues early.</p>



<p>Additionally, Microsoft will maintain an allow list for widely used legacy drivers to prevent system failures. If unsupported drivers are detected, enforcement may be delayed until the system is stable.</p>



<p>For enterprise environments, there is still controlled flexibility. Organizations that rely on custom kernel drivers can allow them using Application Control for Business policies. These policies must be securely signed and tied to UEFI Secure Boot, ensuring only trusted internal drivers are permitted.</p>



<p>Overall, this update marks a significant step toward strengthening Windows security by limiting kernel-level attack vectors and enforcing modern driver validation standards.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-kernel-driver-security-update/">Windows 11 Blocks Untrusted Kernel Drivers to Improve Security</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/windows-kernel-driver-security-update/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft March 2026 Patch Tuesday Fixes 79 Vulnerabilities Including Two 0-Days</title>
		<link>https://firsthackersnews.com/microsoft-march-2026-patch-tuesday/</link>
					<comments>https://firsthackersnews.com/microsoft-march-2026-patch-tuesday/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 11 Mar 2026 06:27:52 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#March2026PatchTuesday]]></category>
		<category><![CDATA[#MicrosoftPatchTuesday]]></category>
		<category><![CDATA[#MicrosoftSecurity]]></category>
		<category><![CDATA[#PatchManagement]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SecurityUpdates]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<category><![CDATA[#ZeroDayVulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11447</guid>

					<description><![CDATA[<p>Microsoft March 2026 Patch Tuesday updates fix 79 security vulnerabilities across Windows, Office, SQL Server, and the .NET</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-march-2026-patch-tuesday/">Microsoft March 2026 Patch Tuesday Fixes 79 Vulnerabilities Including Two 0-Days</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft March 2026 Patch Tuesday updates fix 79 security vulnerabilities across Windows, Office, SQL Server, and the .NET framework, including two publicly disclosed zero-day flaws.</p>



<p>The patches impact several Microsoft platforms, including <strong>Windows, Microsoft Office, SQL Server, Microsoft Edge, and the .NET framework</strong>. Organizations are strongly encouraged to install the updates quickly to protect their systems.</p>



<h2 class="wp-block-heading"><strong><strong>Microsoft March 2026 Patch Tuesday Vulnerability Breakdown</strong></strong></h2>



<p>The March 2026 update includes vulnerabilities across different categories affecting enterprise infrastructure.</p>



<p>Out of the <strong>79 vulnerabilities patched</strong>:</p>



<p>• <strong>3 are rated Critical</strong><br>• the remaining vulnerabilities are classified as <strong>Important or Low severity</strong></p>



<p>Many of the issues fall into these major categories:</p>



<p>• <strong>46 elevation of privilege vulnerabilities</strong><br>• <strong>18 remote code execution vulnerabilities</strong><br>• multiple <strong>information disclosure, spoofing, and denial-of-service flaws</strong></p>



<p>Elevation of privilege vulnerabilities allow attackers to gain higher permissions inside a system, while remote code execution vulnerabilities may allow attackers to run malicious code remotely.</p>



<h3 class="wp-block-heading">Two Publicly Disclosed Zero-Day Vulnerabilities</h3>



<p>Microsoft also fixed <strong>two zero-day vulnerabilities</strong> that were publicly disclosed before official patches were released.</p>



<p>Although these vulnerabilities are not currently known to be actively exploited, public disclosure increases the likelihood of attackers developing exploits.</p>



<p>The two notable vulnerabilities include:</p>



<p>• <strong>SQL Server Elevation of Privilege (CVE-2026-21262)</strong><br>This vulnerability could allow an attacker with limited access to escalate privileges and gain administrative control over SQL Server.</p>



<p>• <strong>.NET Denial of Service Vulnerability</strong><br>This flaw impacts the .NET framework and could allow attackers to disrupt applications and cause service outages.</p>



<h2 class="wp-block-heading"><strong>Patched Vulnerabilities</strong></h2>



<p>Below is a sample list of some vulnerabilities addressed in the March 2026 update.</p>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>CVE ID</th><th>Vulnerability</th><th>Type</th><th>Severity</th></tr></thead><tbody><tr><td>CVE-2024-29059</td><td>.NET Framework Information Disclosure</td><td>Information Disclosure</td><td>Important</td></tr><tr><td>CVE-2024-29057</td><td>Microsoft Edge (Chromium-based) Spoofing</td><td>Spoofing</td><td>Low</td></tr><tr><td>CVE-2024-28916</td><td>Xbox Gaming Services Elevation of Privilege</td><td>Elevation of Privilege</td><td>Important</td></tr><tr><td>CVE-2024-26247</td><td>Microsoft Edge Security Feature Bypass</td><td>Security Feature Bypass</td><td>Low</td></tr><tr><td>CVE-2024-26204</td><td>Outlook for Android Information Disclosure</td><td>Information Disclosure</td><td>Important</td></tr><tr><td>CVE-2024-26203</td><td>Azure Data Studio Elevation of Privilege</td><td>Elevation of Privilege</td><td>Important</td></tr><tr><td>CVE-2024-26199</td><td>Microsoft Office Elevation of Privilege</td><td>Elevation of Privilege</td><td>Important</td></tr><tr><td>CVE-2024-26198</td><td>Microsoft Exchange Server Remote Code Execution</td><td>Remote Code Execution</td><td>Important</td></tr><tr><td>CVE-2024-26197</td><td>Windows Storage Management Denial of Service</td><td>Denial of Service</td><td>Important</td></tr><tr><td>CVE-2024-26190</td><td>Microsoft QUIC Denial of Service</td><td>Denial of Service</td><td>Important</td></tr></tbody></table></figure>



<p>Microsoft also patched several vulnerabilities affecting <strong>Windows kernel components, Microsoft Edge, Azure tools, Visual Studio Code, and enterprise services</strong>.</p>



<h2 class="wp-block-heading"><strong>Why Organizations Should Patch Quickly</strong></h2>



<p>Cyber attackers often analyze Patch Tuesday updates to identify newly fixed vulnerabilities. Systems that remain unpatched may become easy targets for exploitation.</p>



<p>Applying updates promptly helps reduce the risk of:</p>



<p>• unauthorized system access<br>• privilege escalation attacks<br>• remote code execution attempts<br>• potential data breaches</p>



<h2 class="wp-block-heading"><strong>Recommended Security Actions</strong></h2>



<p>Organizations should take the following steps to reduce risk:</p>



<p>• deploy the <strong>March 2026 security updates</strong> as soon as possible<br>• prioritize updates for <strong>internet-facing and critical servers</strong><br>• test patches in a staging environment before full deployment<br>• monitor <strong>SQL Server and .NET applications</strong> for unusual activity<br>• review Microsoft Office configurations to prevent malicious file attacks</p>



<p>Keeping systems fully updated remains one of the most effective ways to protect enterprise environments from evolving cyber threats.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-march-2026-patch-tuesday/">Microsoft March 2026 Patch Tuesday Fixes 79 Vulnerabilities Including Two 0-Days</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-march-2026-patch-tuesday/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hackers Use Microsoft Teams Attack Method to Gain Remote Access</title>
		<link>https://firsthackersnews.com/microsoft-teams-attack-remote-access/</link>
					<comments>https://firsthackersnews.com/microsoft-teams-attack-remote-access/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 10 Mar 2026 05:33:20 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#A0Backdoor]]></category>
		<category><![CDATA[#CyberDefense]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreat]]></category>
		<category><![CDATA[#EnterpriseSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MalwareAttack]]></category>
		<category><![CDATA[#MicrosoftTeams]]></category>
		<category><![CDATA[#MicrosoftTeamsAttack]]></category>
		<category><![CDATA[#PhishingAttack]]></category>
		<category><![CDATA[#QuickAssist]]></category>
		<category><![CDATA[#RemoteAccessAttack]]></category>
		<category><![CDATA[#SecurityAlert]]></category>
		<category><![CDATA[#SocialEngineering]]></category>
		<category><![CDATA[#ThreatActors]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11431</guid>

					<description><![CDATA[<p>Cybersecurity researchers have uncovered Microsoft Teams attack campaigns are now targeting employees in finance and healthcare organizations by</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-teams-attack-remote-access/">Hackers Use Microsoft Teams Attack Method to Gain Remote Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Cybersecurity researchers have uncovered Microsoft Teams attack campaigns are now targeting employees in finance and healthcare organizations by posing as internal IT support.</p>



<p>In this operation, attackers pretend to be internal IT support staff and convince victims to grant remote access to their computers. Once access is obtained, they deploy a stealthy malware tool called <strong>A0Backdoor</strong> to maintain long-term control of the system.</p>



<p>Researchers at BlueVoyant linked the activity to a threat group known as <strong>Blitz Brigantine</strong>, also tracked as <strong>Storm-1811</strong>.</p>



<h2 class="wp-block-heading"><strong><strong>How the Microsoft Teams Attack Begins</strong></strong></h2>



<p>The campaign starts with a tactic designed to overwhelm the victim.</p>



<p>Attackers send a large number of spam emails to the target’s inbox in a short period of time. This “email bombing” creates confusion and pressure for the employee.</p>



<p>Soon after, the attacker contacts the victim through Microsoft Teams, pretending to be from the company’s IT help desk and offering to fix the email problem.</p>



<p>The victim is then guided to open <strong>Windows Quick Assist</strong>, a legitimate remote support tool built into Windows. Once the victim approves the request, the attacker gains full remote control of the device.</p>



<h2 class="wp-block-heading"><strong>Malware Installation Process</strong></h2>



<p>After gaining access, the attackers begin installing malicious software on the system.</p>



<p>They download installer packages that appear to be legitimate updates for Microsoft Teams or Windows Phone Link. To make the files look trustworthy, the attackers:</p>



<p>• host the installers on Microsoft cloud storage accounts<br>• sign the files using digital certificates<br>• disguise them as normal software updates</p>



<p>When the installer runs, it places a real Microsoft application alongside a malicious file named <strong>hostfxr.dll</strong>.</p>



<p>When the legitimate program starts, it accidentally loads the malicious file instead. This technique is known as <strong>DLL sideloading</strong>, which allows malware to run quietly without raising suspicion.</p>



<h2 class="wp-block-heading"><strong>Advanced Evasion Techniques</strong></h2>



<p>The malicious loader uses several tricks to avoid detection and analysis.</p>



<p>• checks system firmware for signs of virtual testing environments<br>• creates multiple junk processing threads to disrupt debugging tools<br>• uses time-based conditions to unlock the main payload</p>



<p>The malware only activates within a specific <strong>55-hour time window</strong>, making it harder for researchers to analyze.</p>



<p>Another unusual trick involves an invisible space character hidden in a command line prompt. The malware requires this hidden character to generate the correct key needed to decrypt the final payload.</p>



<p>These techniques make the attack extremely difficult to study or reproduce.</p>



<h2 class="wp-block-heading"><strong>A0Backdoor and Data Exfiltration</strong></h2>



<p>Once the protection checks are completed, the malware loads <strong>A0Backdoor</strong> directly into memory.</p>



<p>This backdoor allows attackers to collect information and maintain persistent access to the infected system.</p>



<p>The malware gathers details such as:</p>



<p>• system device information<br>• username and environment details<br>• network configuration data</p>



<p>This information helps attackers identify and manage compromised machines.</p>



<h2 class="wp-block-heading"><strong>Using DNS Tunneling to Stay Hidden</strong></h2>



<p>To communicate with attacker servers without raising alarms, the malware uses a technique called <strong>DNS tunneling</strong>.</p>



<p>Instead of connecting directly to a suspicious command server, the malware sends requests through trusted public DNS resolvers such as <strong>1.1.1.1</strong> or <strong>8.8.8.8</strong>.</p>



<p>These requests are disguised as normal mail exchange queries used in everyday email routing.</p>



<p>The attackers hide commands and stolen data inside long subdomains within the DNS requests. The public resolver forwards the request to the attacker’s server and sends the response back to the infected machine.</p>



<p>Because the traffic looks like regular network activity, it blends in with normal corporate operations.</p>



<p>The attackers also rely on <strong>older registered domains</strong> instead of new ones, helping them bypass security filters that often block recently created domains.</p>



<h2 class="wp-block-heading"><strong>How Organizations Can Reduce Risk</strong></h2>



<p>Security experts warn that this campaign shows how attackers are shifting from traditional ransomware to more stealthy and targeted intrusion techniques.</p>



<p>Organizations should take several steps to reduce risk:</p>



<p>• train employees to verify IT support messages received through Microsoft Teams<br>• monitor and restrict remote access tools like Quick Assist<br>• block unapproved software installers from running on company systems<br>• watch for unusual DNS traffic patterns</p>



<p>Improving employee awareness and controlling remote access tools can significantly reduce the chances of these types of attacks succeeding.</p>



<p><strong>Organizations should train employees to recognize signs of a Microsoft Teams attack to prevent remote access abuse.</strong><br></p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong><a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-teams-attack-remote-access/">Hackers Use Microsoft Teams Attack Method to Gain Remote Access</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-teams-attack-remote-access/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>MS-Agent Flaw Allows Remote Hijacking of AI Agents</title>
		<link>https://firsthackersnews.com/ms-agent-remote-hijacking-vulnerability-cve-2026/</link>
					<comments>https://firsthackersnews.com/ms-agent-remote-hijacking-vulnerability-cve-2026/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 03 Mar 2026 09:04:49 +0000</pubDate>
				<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[AI Malware]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[#AIAgents]]></category>
		<category><![CDATA[#AIVulnerability]]></category>
		<category><![CDATA[#CommandInjection]]></category>
		<category><![CDATA[#CVE20262256]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#MSAgent]]></category>
		<category><![CDATA[#PromptInjection]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#ZeroDay]]></category>
		<category><![CDATA[CVE]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security patch]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[vulnerability impact]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11317</guid>

					<description><![CDATA[<p>A serious security issue has been found in the MS-Agent framework. The flaw, tracked as CVE-2026-2256, allows attackers</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ms-agent-remote-hijacking-vulnerability-cve-2026/">MS-Agent Flaw Allows Remote Hijacking of AI Agents</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A serious security issue has been found in the MS-Agent framework. The flaw, tracked as CVE-2026-2256, allows attackers to take control of AI agents and potentially the<a href="https://firsthackersnews.com/oneuptime-command-injection-vulnerability/"> entire system they run on</a>.</p>



<h2 class="wp-block-heading"><strong>What Is the Issue?</strong></h2>



<p>MS-Agent is a lightweight framework used to build autonomous AI agents. One of its built-in features is the Shell tool, which lets the agent run command-line instructions on the operating system.</p>



<p>While this makes the agent powerful, it also creates risk if commands are not properly checked before execution.</p>



<p>Vulnerability details:</p>



<ul class="wp-block-list">
<li>CVE ID: CVE-2026-2256</li>



<li>Type: Command Injection / Remote Code Execution (RCE)</li>



<li>Affected Software: ModelScope MS-Agent</li>



<li>Vulnerable Component: Shell tool (check_safe() method)</li>
</ul>



<h2 class="wp-block-heading"><strong>How the Attack Works</strong></h2>



<p>The problem comes from how MS-Agent validates input. It uses a method called check_safe() that blocks dangerous commands using a denylist.</p>



<p>A denylist only blocks known bad words or patterns. Attackers can bypass this using prompt injection. They hide malicious commands inside normal-looking content such as:</p>



<ul class="wp-block-list">
<li>Documents the AI is asked to summarize</li>



<li>Code the AI is asked to analyze</li>



<li>Text that appears harmless</li>
</ul>



<p>Because denylists can be tricked with alternate spelling, encoding, or different formats, harmful commands can pass through and get executed by the Shell tool.</p>



<h2 class="wp-block-heading"><strong>What Attackers Can Do</strong></h2>



<p>If exploited, attackers can execute operating system commands with the same permissions as the MS-Agent process.</p>



<p>This may allow them to:</p>



<ul class="wp-block-list">
<li>Modify or delete system files</li>



<li>Steal sensitive information</li>



<li>Install malware or backdoors</li>



<li>Use the compromised system to attack others</li>
</ul>



<p>In severe cases, this could result in full system <a href="https://firsthackersnews.com/oneuptime-command-injection-vulnerability/">compromise</a>.</p>



<h2 class="wp-block-heading">Mitigation Steps</h2>



<p>There is currently no official patch available. Organizations using MS-Agent should take immediate precautions:</p>



<ul class="wp-block-list">
<li>Deploy MS-Agent only in controlled environments</li>



<li>Avoid processing untrusted input</li>



<li>Run agents inside secure sandboxes</li>



<li>Apply least-privilege access controls</li>



<li>Replace denylist filtering with strict allowlist validation</li>
</ul>



<p>Until a patch is released, isolation and strong input validation are essential.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener">&nbsp;Instagram</a>,&nbsp;<a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong>&nbsp;to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/ms-agent-remote-hijacking-vulnerability-cve-2026/">MS-Agent Flaw Allows Remote Hijacking of AI Agents</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/ms-agent-remote-hijacking-vulnerability-cve-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Detects Malicious Next.js Repos Used in Live Attack Campaigns</title>
		<link>https://firsthackersnews.com/microsoft-malicious-nextjs-repositories-attack/</link>
					<comments>https://firsthackersnews.com/microsoft-malicious-nextjs-repositories-attack/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Wed, 25 Feb 2026 06:37:48 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[malicious cyber actors]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#C2Server]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#CyberThreats]]></category>
		<category><![CDATA[#DeveloperSecurity]]></category>
		<category><![CDATA[#MaliciousRepositories]]></category>
		<category><![CDATA[#Microsoft]]></category>
		<category><![CDATA[#Nextjs]]></category>
		<category><![CDATA[#Nodejs]]></category>
		<category><![CDATA[#RemoteCodeExecution]]></category>
		<category><![CDATA[#SupplyChainAttack]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11246</guid>

					<description><![CDATA[<p>Microsoft says attackers are creating fake Next.js projects to trick developers. These projects look normal and often appear</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-malicious-nextjs-repositories-attack/">Microsoft Detects Malicious Next.js Repos Used in Live Attack Campaigns</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft says attackers are creating fake Next.js projects to trick developers. These projects look normal and often appear as job assignments or coding tests. But once a developer opens or runs them, hidden code starts executing.</p>



<p>Instead of using obvious malware files, the attackers hide their code inside regular development tools like Visual Studio Code and Node.js. Everything looks like part of normal development work, which makes the attack harder to notice.</p>



<p>The issue first came to light when Node.js processes were seen making repeated outbound connections to suspicious servers over port 3000. These repeated connections raised red flags.</p>



<p>Security experts found that this is part of a larger campaign aimed directly at developers. The attackers use job-related themes so the repositories don’t look suspicious.</p>



<p>By tracking system and network activity, researchers traced the problem back to several Bitbucket repositories. Many of them followed similar naming patterns and reused the same structure and files. That confirmed they were connected to the same operation.</p>



<p><strong>How the Malicious Code Gets Executed</strong></p>



<p>There are three main ways the malicious code gets triggered</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="936" height="654" src="https://firsthackersnews.com/wp-content/uploads/2026/02/image-7.png" alt="" class="wp-image-11248" srcset="https://firsthackersnews.com/wp-content/uploads/2026/02/image-7-200x140.png 200w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-7-300x210.png 300w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-7-400x279.png 400w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-7-600x419.png 600w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-7-768x537.png 768w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-7-800x559.png 800w, https://firsthackersnews.com/wp-content/uploads/2026/02/image-7.png 936w" sizes="(max-width: 936px) 100vw, 936px" /><figcaption class="wp-element-caption"><strong>Attack chain summary (Source: Microsoft Defender).<br><br></strong></figcaption></figure>



<p>In some cases, the attack runs automatically when a developer opens the project in Visual Studio Code. A task is configured to execute as soon as the folder is trusted, which silently launches the hidden script.</p>



<p>In other cases, the attack starts when the developer runs the development server using commands like npm run dev. A file that looks harmless is actually modified to download and execute remote code.</p>



<p>The third method activates when the server starts. The malicious endpoint is hidden in environment variables. When the application launches, it connects to the attacker’s server, sends sensitive data, and runs remote code inside the Node.js process.</p>



<p>The first payload collects system details and keeps checking in with the attacker’s server using a unique ID. It can also download and run extra JavaScript directly in memory.</p>



<p>In the next stage, it becomes a long-running controller that connects to command-and-control servers and executes tasks using Node.js. It includes retry logic, error handling, and file upload endpoints to steal selected data while keeping the session active.</p>



<p><strong>Mitigations</strong></p>



<ul class="wp-block-list">
<li>Treat developer environments as a high-risk attack surface. Apply strict controls when working with unknown or untrusted repositories.</li>



<li>Keep Visual Studio Code Workspace Trust and Restricted Mode enabled by default. Review files like <code>.vscode/tasks.json</code> and <code>next.config.js</code> before trusting a project.</li>



<li>On Windows systems, enable Attack Surface Reduction rules in Defender for Endpoint. Turn on cloud-delivered protection and SmartScreen to block suspicious downloads.</li>



<li>Monitor for unusual Node.js activity, especially repeated outbound connections to suspicious domains or C2 paths. Watch for risky code patterns such as <code>eval</code> or <code>new Function</code> in project files.</li>



<li>Use Microsoft Sentinel to build hunting queries and detection rules to identify abuse of Next.js projects and developer tools early.</li>
</ul>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-malicious-nextjs-repositories-attack/">Microsoft Detects Malicious Next.js Repos Used in Live Attack Campaigns</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-malicious-nextjs-repositories-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft 365 Copilot AI Summary Flaw Exposes Emails</title>
		<link>https://firsthackersnews.com/copilot-dlp-bypass-email-summaries/</link>
					<comments>https://firsthackersnews.com/copilot-dlp-bypass-email-summaries/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Thu, 19 Feb 2026 09:25:05 +0000</pubDate>
				<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[vulnerability]]></category>
		<category><![CDATA[Vulnerability Reports]]></category>
		<category><![CDATA[#AISecurity]]></category>
		<category><![CDATA[#CloudSecurity]]></category>
		<category><![CDATA[#Compliance]]></category>
		<category><![CDATA[#Copilot]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#DataLossPrevention]]></category>
		<category><![CDATA[#DataProtection]]></category>
		<category><![CDATA[#DLPPassBypass]]></category>
		<category><![CDATA[#EmailSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#Microsoft365]]></category>
		<category><![CDATA[#ThreatIntelligence]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security flaw]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11199</guid>

					<description><![CDATA[<p>A security weakness in Microsoft 365 Copilot is allowing the AI assistant to generate summaries of emails that</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/copilot-dlp-bypass-email-summaries/">Microsoft 365 Copilot AI Summary Flaw Exposes Emails</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A security weakness in Microsoft 365 Copilot is allowing the AI assistant to generate summaries of emails that are marked as confidential. This happens even when Data Loss Prevention (DLP) controls are configured to block access to sensitive content.</p>



<p>Because of this flaw, protected email data may be processed by Copilot and surfaced inside AI chat responses, creating a risk of unintended exposure.</p>



<p>The issue is tracked by Microsoft under reference <strong>CW1226324</strong> and was first identified on February 4, 2026. It affects the Copilot <strong>“Work Tab” Chat</strong> feature.</p>



<h3 class="wp-block-heading">Vulnerability Details</h3>



<figure class="wp-block-table"><table><thead><tr><th>Field</th><th>Details</th></tr></thead><tbody><tr><td>Tracking Reference</td><td>CW1226324</td></tr><tr><td>Affected Feature</td><td>Copilot “Work Tab” Chat</td></tr><tr><td>Security Issue</td><td>Bypass of DLP enforcement</td></tr><tr><td>Technical Cause</td><td>Processing logic defect in folder handling</td></tr><tr><td>Impacted Mail Folders</td><td>Sent Items, Drafts</td></tr></tbody></table></figure>



<h3 class="wp-block-heading">Technical Cause and Security Impact</h3>



<p>Microsoft’s investigation found that a defect in how Copilot processes certain mail folders is responsible for the issue.</p>



<p>Due to this error, emails stored in <strong>Sent Items</strong> and <strong>Drafts</strong> can be accessed by Copilot even if confidentiality sensitivity labels are applied.</p>



<p>Normally, sensitivity labels combined with DLP rules should block AI tools from reading or summarizing restricted emails. However, the defect prevents those protections from being properly enforced for the affected folders.</p>



<p>As a result, confidential information may appear in Copilot-generated summaries.</p>



<p>This is especially concerning for sectors such as healthcare, financial services, and government agencies, where strict email protection is tied to regulatory compliance.</p>



<p>The NHS has internally logged the matter as <strong>INC46740412</strong>, confirming operational impact within public sector environments.</p>



<p>Allowing an AI system to process labeled content despite DLP rules represents a serious breakdown in data governance controls.</p>



<h3 class="wp-block-heading">Remediation Status</h3>



<p>Microsoft began deploying a fix on February 11, 2026, and is contacting certain affected customers to confirm the resolution.</p>



<p>The update is still rolling out, and not all tenants may have received the fix yet.</p>



<p>Organizations using Microsoft 365 Copilot with email sensitivity labels enabled could be impacted until remediation is fully completed.</p>



<h3 class="wp-block-heading">Recommended Actions</h3>



<p>Administrators should monitor the Microsoft 365 Admin Center for updates related to reference CW1226324.</p>



<p>It is also recommended to review Copilot audit logs for unexpected access to labeled email content.</p>



<p>Until Microsoft confirms full deployment of the fix, organizations handling highly sensitive communications may consider temporarily limiting Copilot access to reduce exposure risk.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/copilot-dlp-bypass-email-summaries/">Microsoft 365 Copilot AI Summary Flaw Exposes Emails</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/copilot-dlp-bypass-email-summaries/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft 365 Admin Center Disruption Affects North American Users</title>
		<link>https://firsthackersnews.com/microsoft-365-admin-center-outage-north-america/</link>
					<comments>https://firsthackersnews.com/microsoft-365-admin-center-outage-north-america/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Tue, 10 Feb 2026 19:00:03 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#AdminCenterOutage]]></category>
		<category><![CDATA[#CloudOutage]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#EnterpriseIT]]></category>
		<category><![CDATA[#ITAdmins]]></category>
		<category><![CDATA[#ITOperations]]></category>
		<category><![CDATA[#Microsoft365]]></category>
		<category><![CDATA[#SaaSOutage]]></category>
		<category><![CDATA[#ServiceDisruption]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11149</guid>

					<description><![CDATA[<p>Microsoft 365 administrators across North America are experiencing significant access issues with the Microsoft 365 admin center, creating</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-365-admin-center-outage-north-america/">Microsoft 365 Admin Center Disruption Affects North American Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft 365 administrators across North America are experiencing significant access issues with the Microsoft 365 admin center, creating operational challenges for organizations that depend on the platform for daily management tasks. The issue has been acknowledged through Microsoft’s service health communications, confirming that this is a broader service disruption rather than isolated user-side trouble.</p>



<p>Admins report being unable to sign in, facing repeated authentication failures, or encountering error pages and long loading times when trying to access the admin portal. In many cases, sessions time out before any meaningful action can be completed. </p>



<p>These problems are preventing teams from performing routine but critical tasks such as creating and managing user accounts, adjusting security policies, assigning licenses, and reviewing compliance settings.</p>



<h3 class="wp-block-heading"><strong>Widespread Access Problems for Admins</strong></h3>



<p>The disruption appears to be tied to backend systems that handle identity verification and API requests for the admin portal. In simple terms, the services that confirm who an admin is and process their management actions are not responding consistently. This leads to failed logins, broken dashboard views, and incomplete administrative operations.</p>



<p>Because the Microsoft 365 admin center is the central control point for multiple services, the impact extends beyond just one interface. </p>



<p>Administrators responsible for Exchange Online, SharePoint, Microsoft Teams, and Intune are also feeling the effects. Tasks such as mailbox configuration, policy updates, device management changes, and bulk license assignments are being delayed or blocked entirely.</p>



<p>For many organizations, especially those with strict regulatory requirements, these delays can create additional pressure. Inability to quickly adjust access rights, apply security configurations, or complete compliance-related actions may increase risk exposure or complicate audit timelines.</p>



<h3 class="wp-block-heading"><strong>Impact on Operations and Microsoft’s Response</strong></h3>



<p>While some experienced administrators are turning to alternatives like Microsoft Graph API calls or legacy admin portals to complete urgent work, these methods require advanced knowledge and are not practical for every team. </p>



<p>Smaller businesses and organizations that rely solely on the standard admin interface are finding it particularly difficult to maintain normal operations.</p>



<p>Microsoft has stated that its engineering teams are reviewing system telemetry and diagnostic data to determine the root cause. </p>



<p>Although no definitive explanation has been shared yet, early indicators suggest the issue may involve backend capacity constraints or problems within identity service integrations that support the admin experience.</p>



<p>In the meantime, administrators are encouraged to closely monitor official service health updates and enable alert notifications where possible. Collecting diagnostic information and documenting the impact on business operations can also help organizations track risk and prepare for any follow-up actions once full service is restored.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/microsoft-365-admin-center-outage-north-america/">Microsoft 365 Admin Center Disruption Affects North American Users</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/microsoft-365-admin-center-outage-north-america/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft Teams Is Adding Wi-Fi Location Tracking — and It’s Raising Big Questions</title>
		<link>https://firsthackersnews.com/wi-fi-location-tracking/</link>
					<comments>https://firsthackersnews.com/wi-fi-location-tracking/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 26 Jan 2026 07:50:08 +0000</pubDate>
				<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[location tracking]]></category>
		<category><![CDATA[microsoft teams]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<category><![CDATA[teams]]></category>
		<category><![CDATA[WIFI Location]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11047</guid>

					<description><![CDATA[<p>Microsoft is preparing to introduce a new Teams feature that can automatically show where employees are working based</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wi-fi-location-tracking/">Microsoft Teams Is Adding Wi-Fi Location Tracking — and It’s Raising Big Questions</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft is preparing to introduce a new Teams feature that can automatically show where employees are working based on the Wi-Fi networks they connect to. Instead of users manually setting their location, Teams will detect whether someone is in the office and update their work status automatically.</p>



<p>The feature is expected to roll out in March 2026 after being delayed more than once, and it will apply only to Teams desktop apps on Windows and Mac.</p>



<h2 class="wp-block-heading"><strong>How it changes daily work visibility</strong></h2>



<p>When an employee connects to office Wi-Fi, Teams will mark them as working from that location. If they are not connected to organizational networks, their status will reflect remote work. </p>



<p>Microsoft says location data won’t update after work hours and will reset at the end of the day, but the visibility this creates is what’s driving concern.</p>



<p>Although Microsoft describes the feature as optional, the real control lies with administrators. Once enabled at the organization level, employees may have limited ability to opt out, which shifts the feature from a convenience tool to a form of passive monitoring.</p>



<p>What makes this update controversial isn’t the technology itself — it’s the implication. A tool designed for collaboration can easily become a way to enforce attendance rules, monitor hybrid work, and track presence rather than productivity.</p>



<p>For organizations, this raises bigger questions about trust, transparency, and boundaries in modern workplaces. Without clear policies on how this data is used, who can see it, and why it exists, features like this risk damaging employee confidence instead of improving coordination.</p>



<p>This isn’t just a Teams update — it’s a glimpse into how workplace tech is slowly redefining the line between collaboration and surveillance.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/wi-fi-location-tracking/">Microsoft Teams Is Adding Wi-Fi Location Tracking — and It’s Raising Big Questions</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/wi-fi-location-tracking/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Windows 11 January Update Triggers Serious Boot Issues</title>
		<link>https://firsthackersnews.com/windows-11/</link>
					<comments>https://firsthackersnews.com/windows-11/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Mon, 26 Jan 2026 07:29:11 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#BootFailure]]></category>
		<category><![CDATA[#ITAdmin]]></category>
		<category><![CDATA[#Microsoft]]></category>
		<category><![CDATA[#PatchTuesday]]></category>
		<category><![CDATA[#SystemStability]]></category>
		<category><![CDATA[#TechNews]]></category>
		<category><![CDATA[#Windows11]]></category>
		<category><![CDATA[#WindowsUpdate]]></category>
		<category><![CDATA[security advisory]]></category>
		<category><![CDATA[security fix]]></category>
		<category><![CDATA[security update]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=11043</guid>

					<description><![CDATA[<p>Microsoft investigates startup and stability issues affecting recent Windows 11 versions Microsoft is investigating serious problems linked to</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-11/">Windows 11 January Update Triggers Serious Boot Issues</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Microsoft investigates startup and stability issues affecting recent Windows 11 versions</strong></p>



<p>Microsoft is investigating serious problems linked to its January 2026 security update for Windows 11 after reports of systems failing to start correctly. The update, which was meant to strengthen security, has instead left some users unable to boot their devices.</p>



<p>The issue is tied to update KB5074109, released for Windows 11 versions 25H2 and 24H2. Shortly after installation, affected systems began showing critical startup errors, including boot loops and black screens. In some cases, devices display an <em>UNMOUNTABLE_BOOT_VOLUME</em> error and never reach the login screen.</p>



<p>Microsoft has acknowledged the problem and confirmed receiving a limited number of reports where devices cannot complete startup. So far, the issue appears to affect physical machines only, with virtual environments remaining unaffected. For impacted users, access to the operating system is often lost entirely, requiring recovery tools to remove the update.</p>



<p>Even on systems that manage to boot, the update has caused widespread stability concerns. Users report random freezes, display issues, and conflicts with graphics drivers, particularly during GPU-intensive tasks. Some applications become unresponsive without triggering a crash or error message, leaving systems stuck until a forced restart.</p>



<p>The update has also disrupted productivity and enterprise services. Microsoft confirmed that credential prompts for certain cloud and remote desktop services were broken, temporarily preventing users from connecting. Outlook Classic users have also reported freezes and sync problems after startup.</p>



<h3 class="wp-block-heading">What users should do now</h3>



<ul class="wp-block-list">
<li>Uninstall the latest update using the Windows Recovery Environment if the system won’t boot</li>



<li>Roll back KB5074109 or pause updates on unstable systems</li>



<li>Delay installing the update until Microsoft releases a permanent fix</li>
</ul>



<p>Microsoft continues to investigate the root cause of these failures. Until a comprehensive resolution is available, users and administrators are advised to approach the January update with caution, especially on production systems.</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-11/">Windows 11 January Update Triggers Serious Boot Issues</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/windows-11/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Security Bypass Issue Found in Windows Remote Assistance</title>
		<link>https://firsthackersnews.com/windows-remote-assistance-security-bypass/</link>
					<comments>https://firsthackersnews.com/windows-remote-assistance-security-bypass/#respond</comments>
		
		<dc:creator><![CDATA[FHN]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 02:27:44 +0000</pubDate>
				<category><![CDATA[windows]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Internet Security]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Secuirty Update]]></category>
		<category><![CDATA[Security Advisory]]></category>
		<category><![CDATA[#CyberSecurity]]></category>
		<category><![CDATA[#infosec]]></category>
		<category><![CDATA[#ITSecurity]]></category>
		<category><![CDATA[#MicrosoftSecurity]]></category>
		<category><![CDATA[#PatchTuesday]]></category>
		<category><![CDATA[#RemoteAssistance]]></category>
		<category><![CDATA[#SecurityUpdates]]></category>
		<category><![CDATA[#VulnerabilityManagement]]></category>
		<category><![CDATA[#WindowsSecurity]]></category>
		<guid isPermaLink="false">https://firsthackersnews.com/?p=10996</guid>

					<description><![CDATA[<p>Microsoft has addressed a security weakness in Windows Remote Assistance that could allow attackers to bypass built-in protection</p>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-remote-assistance-security-bypass/">Security Bypass Issue Found in Windows Remote Assistance</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Microsoft has addressed a security weakness in Windows Remote Assistance that could allow attackers to bypass built-in protection mechanisms and access sensitive data under certain conditions. The vulnerability, tracked as CVE-2026-20824, has been rated <em>Important</em> and mainly impacts how Windows applies trust checks to files involved in Remote Assistance sessions.</p>



<p>While the issue does not enable full system takeover, it weakens safeguards designed to protect users from untrusted content, making it particularly relevant in post-compromise or insider attack scenarios.</p>



<h2 class="wp-block-heading"><strong>How the Vulnerability Works</strong></h2>



<p>The flaw lies in how Windows Remote Assistance handles specially crafted files used to start or manage assistance sessions. In some cases, these files are processed in a way that skips normal security checks, allowing them to appear more trusted than they actually are.</p>



<p>As a result, protections tied to <strong>Mark of the Web (MOTW)</strong>—such as warning prompts, SmartScreen checks, and certain script or macro restrictions—may not be enforced. </p>



<p>This means content that originated from the internet could be opened locally without the usual defenses, increasing the risk of stealthy data access or follow-on attacks.</p>



<p>Exploitation requires user interaction, typically by convincing a victim to open a malicious file delivered through email, messaging platforms, or a web download.</p>



<h2 class="wp-block-heading"><strong>Impact, Affected Systems, and Mitigation</strong></h2>



<ul class="wp-block-list">
<li><strong>Impact:</strong> Enables attackers to bypass Mark of the Web protections, potentially allowing sensitive data access or stealthy follow-on attacks without triggering expected security warnings.</li>



<li><strong>Affected Systems:</strong> Supported versions of <strong>Windows 10</strong>, <strong>Windows 11</strong>, and <strong>Windows Server</strong>, including both client and enterprise deployments.</li>



<li><strong>Mitigation:</strong> Microsoft has addressed the issue in the <strong>January 2026 Patch Tuesday</strong> updates. Organizations should apply the updates as soon as possible. Until patching is complete, administrators are advised to restrict Windows Remote Assistance usage, enhance email and web filtering controls, and remind users to avoid opening unsolicited assistance files or attachments.</li>
</ul>



<p>Applying the latest security updates restores proper protection checks and significantly reduces the risk of this bypass technique being exploited.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p><strong>&#x200d;Follow Us on:<strong> <a href="https://www.linkedin.com/in/firsthackers-news/" target="_blank" rel="noopener">Linkedin</a>,<a href="https://www.instagram.com/firsthackersnews/" target="_blank" rel="noreferrer noopener"> Instagram</a>, <a href="https://www.facebook.com/FirsthackerNews" target="_blank" rel="noreferrer noopener">Facebook</a></strong> to get the latest security news!</strong></p>
</blockquote>
<p>The post <a rel="nofollow" href="https://firsthackersnews.com/windows-remote-assistance-security-bypass/">Security Bypass Issue Found in Windows Remote Assistance</a> appeared first on <a rel="nofollow" href="https://firsthackersnews.com">First Hackers News</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://firsthackersnews.com/windows-remote-assistance-security-bypass/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
