Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Trellix Source Code Breach: Hackers Access Repository
May 2, 2026
Hackers Exploit cPanel Flaw to Breach Government Military
May 2, 2026
Exim Mail Server Vulnerabilities Lead to Crash via DNS Data
May 2, 2026
Home/CyberSecurity News/Windows 11 and Server 2025 Update to Block Untrusted Cross-Signed
CyberSecurity News

Windows 11 and Server 2025 Update to Block Untrusted Cross-Signed

Microsoft is implementing a significant security change for the Windows operating system. To counter kernel-level threats, the company will no longer trust drivers signed through its deprecated...

Marcus Rodriguez
Marcus Rodriguez
March 28, 2026 2 Min Read
0 0

Microsoft is implementing a significant security change for the Windows operating system. To counter kernel-level threats, the company will no longer trust drivers signed through its deprecated cross-signed root program.

Starting with the April 2026 update, Windows 11 and Windows Server 2025 will block these untrusted drivers by default.

This policy ensures that only drivers certified through the Windows Hardware Compatibility Program can load automatically, significantly reducing the attack surface for malicious actors.​

Closing a legacy Security Gap

The cross-signed root program was introduced in the early 2000s to allow third-party certificate authorities to issue Windows-trusted code-signing certificates.

However, this system provided no assurances regarding the security or compatibility of the kernel code. Because developers managed their own private keys, the program became a frequent target for credential theft, allowing threat actors to deploy rootkits.​

Microsoft officially deprecated this signing program in 2021, and all related certificates have since expired. Despite this, Windows continued to trust these legacy certificates to maintain compatibility with legacy hardware.

Drivers will be blocked on enforced systems, with a notification displayed(source : microsoft)
Drivers will be blocked on enforced systems, with a notification displayed(source: Microsoft)

This new update finally severs that lingering trust. Moving forward, the certification pipeline requires vendors to pass strict identity vetting, submit rigorous test results, and undergo malware scanning before receiving a protected Microsoft-owned certificate.

To prevent system crashes, Microsoft is introducing an explicit allow list for highly reputable, widely used cross-signed drivers.

The kernel update will also deploy in a careful evaluation mode. The Windows kernel will audit driver load signals to ensure the new policy will not disrupt critical functions.

The system will only enforce the block after meeting specific runtime and restart thresholds.​ If an unsupported driver is detected during this audit phase, the system resets the evaluation timer and holds off on enforcement.​

Enterprise environments relying on internally developed custom kernel drivers have alternative options. Organizations can securely bypass the default block using an Application Control for Business policy.

By signing this policy with an authority rooted in the device’s UEFI Secure Boot variables, administrators can explicitly trust private signers.

This ensures threat actors cannot arbitrarily load malicious drivers while legitimate internal operations continue uninterrupted.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

CISA Adds Aquasecurity Trivy Flaw Scanner Vulnerability

Next Post

European Commission Confirms Cyberattack After AWS Account Hack

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
cPanelSniper PoC Exploit for cPanel Vulner Disclosed Vulnerability
May 2, 2026
EtherRAT Targets Enterprise Admins with SEO Poison
May 1, 2026
New Spyware Platform: Rebrand & Resell Android Lets Buyers
May 1, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us