Microsoft Patches Critical Zero-Days

Microsoft Patches Critical Zero-Days

11 February 2026

What happened

Microsoft confirmed active exploitation of critical zero-day vulnerabilities in Windows and Office. Attackers gain full system control when users click malicious links or open infected files. These flaws bypass standard security perimeters. Microsoft released emergency patches to close these entry points. The breach affects all current versions of Windows and Microsoft 365 applications. Security teams must deploy updates to prevent remote code execution and unauthorised data access.

Why it matters

Security architects face immediate risk because these zero-days allow remote code execution via standard productivity tools. This increases the attack surface for enterprise environments. IT procurement teams must account for unplanned patching costs. This vulnerability follows Microsoft’s December decision to prioritise AI development over core software maintenance. Therefore, resource shifts toward AI features create security gaps in legacy code. Result: increased exposure for Windows-dependent infrastructure and higher operational overhead for defence teams.

AI generated content may differ from the original.

Published on 11 February 2026

Subscribe for Weekly Updates

Stay ahead with our weekly AI and tech briefings, delivered every Tuesday.

Microsoft Patches Critical Zero-Days