Latest security news
- Microsoft patches 80+ vulnerabilities, six flagged as “more likely” to be exploited
- Cyber-Attacks on UK Firms Increase at Four Times Global Rate
- YouTube draws a line on deepfakes involving politicians and journalists
- Microsoft Fixes Two Publicly Disclosed Zero-Days
- Cloud-audit: Fast, open-source AWS security scanner
- Software vulnerabilities push credential abuse aside in cloud intrusions
- OpenAI's Promptfoo Deal Plugs Agentic AI Testing Gap
- Only 24% Of organizations Test Identity Recovery Every Six Months
- Cloud Attackers Now Prefer Vulnerability Exploits Over Credentials, Google Cloud Finds
- Ericsson Breach Exposes Data of 15k Employees and Customers
- ShinyHunters Targets Hundreds of Websites in New Salesforce Campaign
- Threat Actor Exploits Flaws and Uses Elastic Cloud SIEM to Manage Stolen Data
- Trump Administration Unveils New Cyber Strategy for America
- UK Launches New Crackdown Unit to Tackle Cyber-Fraud at the Source
- AI Security Startups Dominate New Cyber Innovation Awards
- TriZetto Provider Solutions Breach Hits 3.4 Million Patients
- Ghanaian Pleads Guilty to Role in $100m Romance Scam
- Iran's MuddyWater Hackers Hit US Firms with New 'Dindoor' Backdoor
- Zero‑Day Attacks on Enterprise Software Reach Record High, Google Warns
On March 2026 Patch Tuesday, Microsoft addressed 80+ vulnerabilities affecting its software and cloud services. Of these, two were publicly disclosed, but not actively exploited. Privilege escalation vulnerabilities abound The two publicly disclosed flaws are CVE-2026-21262, a vulnerability in SQL Server that may allow attackers to gain SQLAdmin privileges, and CVE-2026-26127, a .NET flaw that can be triggered for a denial of service attack. The former is “less likely” to be exploited, and the latter …
(C) Do-Know.com (http://do-know.com/). Do not copy without permission from info at do-know.com.