• Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World
Newsy Today
news of today
Home - AppSec
Tag:

AppSec

Tech

Microsoft patches major SQL Server flaw in March update

by Chief Editor March 13, 2026
written by Chief Editor

March 2026 Patch Tuesday: A Deep Dive into Microsoft’s Latest Security Updates

Microsoft’s March 2026 Patch Tuesday addressed a substantial 77 security vulnerabilities across its product suite, with a notable focus on SQL Server. This release included fixes for two zero-day vulnerabilities that were publicly known before patches were available, though currently, there’s no evidence of widespread exploitation.

SQL Server Under Scrutiny: CVE-2026-21262

The most critical update centers around CVE-2026-21262, an elevation-of-privilege vulnerability impacting a wide range of SQL Server versions, from the latest 2025 release all the way back to SQL Server 2016 Service Pack 3. While the vulnerability has a CVSS v3 base score of 8.8 – just shy of “critical” – the potential impact is significant. An attacker with low-level privileges could potentially escalate to sysadmin-level rights over the database engine across a network.

According to Rapid7’s Lead Software Engineer, Adam Barnett, this isn’t a typical SQL Server patch. The ability to gain sysadmin access over a network is a serious concern. Despite Microsoft rating exploitation as less likely, the public disclosure of the vulnerability increases the urgency for administrators to apply the patch.

Even organizations that don’t directly expose SQL Server to the internet are at risk. Internet scanning reveals a considerable number of accessible SQL Server instances, amplifying the potential impact should reliable exploits emerge. Successful exploitation could allow attackers to access or alter data and potentially pivot to the underlying operating system using features like xp_cmdshell, which, while disabled by default, can be re-enabled by a sysadmin.

.NET Denial-of-Service Vulnerability (CVE-2026-26127)

Another key vulnerability addressed this month is CVE-2026-26127, affecting .NET applications and potentially leading to denial-of-service (DoS) conditions. Public disclosure of this vulnerability has also occurred. Exploitation could cause service crashes, creating brief windows where monitoring and security tools are offline, potentially allowing attackers to evade detection.

Repeated exploitation, even by less sophisticated attackers, could disrupt online services and lead to breaches of service-level agreements.

Authenticator App Vulnerability (CVE-2026-26123)

Microsoft also patched a vulnerability in the Microsoft Authenticator mobile app for iOS and Android (CVE-2026-26123). This flaw, related to custom URL schemes and improper authorisation, could allow a malicious app to impersonate Microsoft Authenticator and intercept authentication information, potentially leading to account compromise. While requiring user interaction – specifically, choosing a malicious app to handle the sign-in flow – Microsoft considers this an important vulnerability.

Organizations managing mobile devices should review app installation policies and default handler settings for authentication apps to restrict potentially harmful sign-in flows.

End of Life for SQL Server 2012 Parallel Data Warehouse

Beyond security patches, Microsoft announced the end of extended support for SQL Server 2012 Parallel Data Warehouse at the end of March. Customers continuing to use this platform will no longer receive security updates, leaving them vulnerable to potential exploits.

Future Trends in Vulnerability Management

These updates highlight several emerging trends in vulnerability management. The increasing speed of public disclosure before patches are available is a major concern. Attackers are actively scanning for vulnerabilities and sharing information, reducing the window of opportunity for defenders. This necessitates a shift towards proactive threat hunting and robust intrusion detection systems.

The focus on vulnerabilities in authentication mechanisms, like the Microsoft Authenticator app, underscores the growing importance of securing identity and access management (IAM) systems. Multi-factor authentication is becoming increasingly prevalent, making these applications prime targets for attackers.

The continued patching of older SQL Server versions, even those nearing end-of-life, demonstrates the long-tail challenge of maintaining security in complex environments. Organizations must prioritize patching critical vulnerabilities across all systems, regardless of age, and consider implementing compensating controls where patching is not immediately feasible.

Did you know?

Publicly disclosed vulnerabilities, even without known exploits, significantly increase the risk of attack. Attackers actively monitor vulnerability databases and security blogs for new disclosures.

FAQ

Q: What is Patch Tuesday?
A: Patch Tuesday is the unofficial name for the regular schedule when Microsoft releases security updates for its products.

Q: What is a zero-day vulnerability?
A: A zero-day vulnerability is a flaw that is unknown to the vendor and for which no patch is available, giving attackers a window of opportunity to exploit it.

Q: What is the CVSS score?
A: The Common Vulnerability Scoring System (CVSS) is an industry standard for assessing the severity of software vulnerabilities.

Q: Should I patch all vulnerabilities immediately?
A: Prioritize patching based on the severity of the vulnerability, the potential impact to your organization, and the availability of exploits.

Q: What is xp_cmdshell?
A: xp_cmdshell is a stored procedure in SQL Server that allows execution of operating system commands.

Pro Tip: Regularly scan your network for vulnerable systems and prioritize patching based on risk assessment.

Stay informed about the latest security threats and updates by subscribing to security advisories and following reputable security blogs. Proactive vulnerability management is essential for protecting your organization from cyberattacks.

March 13, 2026 0 comments
0 FacebookTwitterPinterestEmail
Tech

Tenable warns of widening AI exposure gap in cloud

by Chief Editor February 23, 2026
written by Chief Editor

The Widening AI Exposure Gap: Why Cloud Security is Falling Behind

Organisations are facing a growing cybersecurity challenge: an “AI exposure gap.” This isn’t about AI *causing* breaches, but rather the rapid integration of AI, cloud technologies, and third-party software creating vulnerabilities that security teams struggle to identify and address. A recent report from Tenable highlights this critical mismatch between engineering speed and security capabilities.

The Software Supply Chain: A Major Weak Point

The report reveals a significant risk within the software supply chain. A staggering 86% of organisations have third-party code packages installed containing critical-severity vulnerabilities. Even more concerning, 13% have deployed packages with a known history of compromise, including instances linked to the s1ngularity and Shai-Hulud worms. This demonstrates that vulnerabilities aren’t just theoretical; they’re actively being exploited.

The increasing use of AI and Model Context Protocol third-party packages – found in 70% of organisations – further complicates matters. These integrations often bypass traditional security oversight, embedding AI deeper into systems and expanding the attack surface.

Identity and Access Management: A Critical Control Point

Identity controls are proving to be a major pressure point. “Ghost” secrets – unused or unrotated cloud credentials – plague 65% of organisations. Alarmingly, 17% of these unused credentials grant critical administrative privileges. Nearly half (49%) of identities with excessive permissions remain dormant, representing a significant potential entry point for attackers.

The report also raises concerns about permissions granted to AI services themselves, with 18% of organisations giving them rarely-audited administrative access. Non-human identities, like AI agents and service accounts, now pose a higher risk (52%) than human users (37%), due to “toxic combinations” of permissions across fragmented systems.

The Rise of “Invisible” Exposure

Tenable defines this challenge as an issue of “exposure management” – the process of identifying, evaluating, and prioritizing risks across all potential attacker entry points. AI adoption dramatically expands the number of systems and components that can inherit risk, adding new layers to applications, infrastructure, identities, and data. This creates a largely invisible exposure that many security teams are ill-equipped to manage.

The report identified severe risks in four key areas: AI security posture, supply chain attack vectors, least-privilege implementation, and cloud workload exposure.

What Can Organisations Do?

The report recommends a multi-faceted approach. Improving visibility of AI integrations is paramount, alongside tightening identity-centric controls. Implementing least-privilege practices for AI roles, removing “ghost” identities, and eliminating exposure from static secrets are also crucial steps. Recognizing that third-party code and external accounts now function as extensions of an organisation’s infrastructure is vital.

Liat Hayun, Senior Vice President of Product Management and Research at Tenable, emphasizes the demand for security teams to proactively account for AI systems embedded within infrastructure. She states that a lack of visibility and governance leaves teams vulnerable to new exposures, including over-privileged identities in the cloud.

Hayun advocates for focusing on the “unified exposure path” to move beyond managing “security debt” and towards managing actual business risk.

Pro Tip

Regularly audit and rotate cloud credentials. Implement multi-factor authentication (MFA) wherever possible to add an extra layer of security.

Future Trends to Watch

The AI exposure gap isn’t a static problem; it’s likely to worsen as AI becomes more pervasive. Several trends will exacerbate the challenge:

  • Increased AI Complexity: AI models will develop into more complex, making it harder to understand their internal workings and potential vulnerabilities.
  • AI-Powered Attacks: Attackers will increasingly leverage AI to automate and refine their attacks, making them more sophisticated and tough to detect.
  • Expansion of Non-Human Identities: The number of AI agents and service accounts will continue to grow, increasing the risk associated with non-human identities.
  • Decentralized AI Development: More AI development will occur outside of centralized IT departments, leading to shadow AI and increased security risks.

FAQ

Q: What is the “AI exposure gap”?
A: It’s the growing mismatch between the speed of AI and cloud adoption and the ability of security teams to assess and remediate associated risks.

Q: How significant is the risk from third-party code?
A: 86% of organisations have third-party code packages with critical vulnerabilities, and 13% have deployed compromised packages.

Q: What is exposure management?
A: It’s the process of identifying, evaluating, and prioritizing risks across all potential attacker entry points.

Did you know?

Non-human identities (AI agents, service accounts) now present a higher risk profile than human users, according to Tenable’s research.

Want to learn more about securing your cloud environment? Explore our other articles on cloud security best practices.

February 23, 2026 0 comments
0 FacebookTwitterPinterestEmail

Recent Posts

  • Total War: Warhammer 40,000 to Feature Destructible Terrain

    May 1, 2026
  • Indonesian Groups Reject Tobacco Tier Tax Proposal

    May 1, 2026
  • Cadillac Championship Round 2: How to Watch, Tee Times & Scores

    May 1, 2026
  • Emergency doctor warns of overdose risk from common supplement

    May 1, 2026
  • Study: AI models that consider user’s feeling are more likely to make errors

    May 1, 2026

Popular Posts

  • 1

    Maya Jama flaunts her taut midriff in a white crop top and denim jeans during holiday as she shares New York pub crawl story

    April 5, 2025
  • 2

    Saar-Unternehmen hoffen auf tiefgreifende Reformen

    March 26, 2025
  • 3

    Marta Daddato: vita e racconti tra YouTube e podcast

    April 7, 2025
  • 4

    Unlocking Success: Why the FPÖ Could Outperform Projections and Transform Austria’s Political Landscape

    April 26, 2025
  • 5

    Mecimapro Apologizes for DAY6 Concert Chaos: Understanding the Controversy

    May 6, 2025

Follow Me

Follow Me
  • Cookie Policy
  • CORRECTIONS POLICY
  • PRIVACY POLICY
  • TERMS OF SERVICE

Hosted by Byohosting – Most Recommended Web Hosting – for complains, abuse, advertising contact: o f f i c e @byohosting.com


Back To Top
Newsy Today
  • Business
  • Entertainment
  • Health
  • News
  • Sport
  • Tech
  • World