{"id":13788,"date":"2026-04-15T13:41:50","date_gmt":"2026-04-15T13:41:50","guid":{"rendered":"https:\/\/techtrendfeed.com\/?p=13788"},"modified":"2026-04-15T13:41:50","modified_gmt":"2026-04-15T13:41:50","slug":"patch-tuesday-april-2026-version-krebs-on-safety","status":"publish","type":"post","link":"https:\/\/techtrendfeed.com\/?p=13788","title":{"rendered":"Patch Tuesday, April 2026 Version \u2013 Krebs on Safety"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<p><strong>Microsoft<\/strong> as we speak pushed software program updates to repair a staggering 167 safety vulnerabilities in its <strong>Home windows<\/strong> working techniques and associated software program, together with a <strong>SharePoint Server<\/strong> zero-day and a publicly disclosed weak spot in <strong>Home windows Defender<\/strong> dubbed \u201c<strong>BlueHammer<\/strong>.\u201d Individually, <strong>Google Chrome<\/strong> fastened its fourth zero-day of 2026, and an emergency replace for <strong>Adobe Reader<\/strong> nixes an actively exploited flaw that may result in distant code execution.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-56287 aligncenter\" src=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png\" alt=\"A picture of a windows laptop in its updating stage, saying do not turn off the computer. \" width=\"749\" height=\"527\" srcset=\"https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate.png 841w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-768x541.png 768w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-782x550.png 782w, https:\/\/krebsonsecurity.com\/wp-content\/uploads\/2021\/07\/windupate-100x70.png 100w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\"\/><\/p>\n<p>Redmond warns that attackers are already focusing on <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-32201\" target=\"_blank\" rel=\"noopener\">CVE-2026-32201<\/a>, a vulnerability in Microsoft SharePoint Server that permits attackers to spoof trusted content material or interfaces over a community.<\/p>\n<p><strong>Mike Walters<\/strong>, president and co-founder of <strong>Action1<\/strong>, stated CVE-2026-32201 can be utilized to deceive staff, companions, or prospects by presenting falsified info inside trusted SharePoint environments.<\/p>\n<p>\u201cThis CVE can allow phishing assaults, unauthorized knowledge manipulation, or social engineering campaigns that result in additional compromise,\u201d Walters stated. \u201cThe presence of lively exploitation considerably will increase organizational threat.\u201d<\/p>\n<p>Microsoft additionally addressed BlueHammer (<a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2026-33825\" target=\"_blank\" rel=\"noopener\">CVE-2026-33825<\/a>), a privilege escalation bug in Home windows Defender. In line with BleepingComputer, the researcher who found the flaw <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit\/\" target=\"_blank\" rel=\"noopener\">revealed exploit code for it<\/a> after notifying Microsoft and rising exasperated with their response. <strong>Will Dormann<\/strong>, senior principal vulnerability analyst at <strong>Tharros<\/strong>, says he <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/infosec.exchange\/@wdormann\/116404516592597593\" target=\"_blank\" rel=\"noopener\">confirmed<\/a> that the general public BlueHammer exploit code now not works after putting in as we speak\u2019s patches.<span id=\"more-73440\"\/><\/p>\n<p><strong>Satnam Narang<\/strong>, senior employees analysis engineer at <strong>Tenable<\/strong>, stated April marks the second-biggest Patch Tuesday ever for Microsoft. Narang additionally stated there are indications {that a} zero-day flaw Adobe patched in an emergency replace on April 11 \u2014 <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/helpx.adobe.com\/security\/products\/acrobat\/apsb26-43.html\" target=\"_blank\" rel=\"noopener\">CVE-2026-34621<\/a> \u2014 has seen lively exploitation since at the least November 2025.<\/p>\n<p><strong>Adam Barnett<\/strong>, lead software program engineer at <strong>Rapid7<\/strong>, known as the patch whole from Microsoft as we speak \u201ca brand new report in that class\u201d as a result of it consists of practically 60 browser vulnerabilities. Barnett stated it is likely to be tempting to think about that this sudden spike was tied to the thrill across the announcement every week in the past as we speak of <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.anthropic.com\/glasswing\" target=\"_blank\" rel=\"noopener\">Challenge Glasswing<\/a> \u2014 a much-hyped however nonetheless unreleased new AI functionality from Anthropic that&#8217;s reportedly fairly good at discovering bugs in an unlimited array of software program.<\/p>\n<p>However he notes that <strong>Microsoft Edge<\/strong> relies on the Chromium engine, and the Chromium maintainers acknowledge a variety of researchers for the vulnerabilities which Microsoft republished final Friday.<\/p>\n<p>\u201cA secure conclusion is that this improve in quantity is pushed by ever-expanding AI capabilities,\u201d Barnett stated. \u201cWe must always count on to see additional will increase in vulnerability reporting quantity because the affect of AI fashions prolong additional, each by way of functionality and availability.\u201d<\/p>\n<p>Lastly, it doesn&#8217;t matter what browser you utilize to surf the online, it\u2019s necessary to utterly shut out and restart the browser periodically. That is very easy to place off (particularly when you&#8217;ve got a bajillion tabs open at any time) however it\u2019s the one method to make sure that any accessible updates get put in. For instance, a Google Chrome replace launched earlier this month fastened 21 safety holes, together with the high-severity zero-day flaw <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-5281\" target=\"_blank\" rel=\"noopener\">CVE-2026-5281<\/a>.<\/p>\n<p>For a clickable, per-patch breakdown, take a look at the <strong>SANS Web Storm Heart<\/strong> <a rel=\"nofollow\" target=\"_blank\" href=\"https:\/\/isc.sans.edu\/forums\/diary\/Microsoft%20Patch%20Tuesday%20April%202026.\/32898\/\" target=\"_blank\" rel=\"noopener\">Patch Tuesday roundup<\/a>. Working into issues making use of any of those updates? Depart a notice about it within the feedback beneath and there\u2019s a good probability somebody right here will pipe in with an answer.<\/p>\n<\/p><\/div>\n\n","protected":false},"excerpt":{"rendered":"<p>Microsoft as we speak pushed software program updates to repair a staggering 167 safety vulnerabilities in its Home windows working techniques and associated software program, together with a SharePoint Server zero-day and a publicly disclosed weak spot in Home windows Defender dubbed \u201cBlueHammer.\u201d Individually, Google Chrome fastened its fourth zero-day of 2026, and an emergency [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13790,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[1038,406,262,1077,211,1078],"class_list":["post-13788","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-april","tag-edition","tag-krebs","tag-patch","tag-security","tag-tuesday"],"_links":{"self":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13788","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=13788"}],"version-history":[{"count":1,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13788\/revisions"}],"predecessor-version":[{"id":13789,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/posts\/13788\/revisions\/13789"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=\/wp\/v2\/media\/13790"}],"wp:attachment":[{"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=13788"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=13788"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techtrendfeed.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=13788"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}<!-- This website is optimized by Airlift. Learn more: https://airlift.net. Template:. Learn more: https://airlift.net. Template: 69d9690a190636c2e0989534. Config Timestamp: 2026-04-10 21:18:02 UTC, Cached Timestamp: 2026-04-15 18:24:28 UTC -->