Microsoft Patches Critical Zero-Days

Microsoft Patches Critical Zero-Days

11 February 2026

What happened

Microsoft confirmed active exploitation of critical zero-day vulnerabilities in Windows and Office. Attackers gain full system control when users click malicious links or open infected files. These flaws bypass standard security perimeters. Microsoft released emergency patches to close these entry points. The breach affects all current versions of Windows and Microsoft 365 applications. Security teams must deploy updates to prevent remote code execution and unauthorised data access.

Why it matters

Security architects face immediate risk because these zero-days allow remote code execution via standard productivity tools. This increases the attack surface for enterprise environments. IT procurement teams must account for unplanned patching costs. This vulnerability follows Microsoft’s December decision to prioritise AI development over core software maintenance. Therefore, resource shifts toward AI features create security gaps in legacy code. Result: increased exposure for Windows-dependent infrastructure and higher operational overhead for defence teams.

AI generated content may differ from the original.

Published on 11 February 2026
microsoftzerodaycybersecuritywindowsoffice
  • Emergency Patches from Tech Giants

    Emergency Patches from Tech Giants

    Read more about Emergency Patches from Tech Giants
  • AI Firms Tackle Prompt Injection

    AI Firms Tackle Prompt Injection

    Read more about AI Firms Tackle Prompt Injection
  • Trump Exempts Tech Giants From Chip Tariffs

    Trump Exempts Tech Giants From Chip Tariffs

    Read more about Trump Exempts Tech Giants From Chip Tariffs
  • Big Tech AI Spending Surge

    Big Tech AI Spending Surge

    Read more about Big Tech AI Spending Surge
Microsoft Patches Critical Zero-Days