Microsoft has released updates to fix more than 50 security vulnerabilities in its Windows operating systems and other software. The patches include fixes for six “zero-day” flaws that attackers are already exploiting in the wild. These zero-day vulnerabilities can allow attackers to bypass security features, execute malicious code, or gain access to sensitive data.
Some of the vulnerabilities being addressed include a feature bypass vulnerability in Windows Shell, allowing attackers to run attacker-controlled content without warning; a security bypass bug targeting MSHTML, the default web browser engine; and a local privilege escalation flaw in Windows Remote Desktop Services.
Microsoft has issued several out-of-band security updates since January’s Patch Tuesday, including fixes for zero-day vulnerabilities in Microsoft Office and remote code execution flaws in integrated development environments such as VS Code. The company is advising developers to understand the risks of artificial intelligence (AI) and apply least-privilege principles to limit the impact of potential security breaches.
Meanwhile, Linux users can breathe a sigh of relief knowing that they are generally not targeted by attackers due to the operating system’s popularity and strong community support. However, it’s essential for users to manually update their systems and applications regularly to ensure security patches are applied in a timely manner. The article highlights the importance of regular updates and emphasizes that both Windows and Linux require ongoing maintenance to stay secure.
Source: https://krebsonsecurity.com/2026/02/patch-tuesday-february-2026-edition