Friday, May 1, 2026

Most Windows 11 machines are updating automatically

 

What is happening now

Microsoft is actively forcing feature updates on unmanaged Windows 11 PCs (Home and most Pro machines not controlled by IT):


What is not happening

Managed / work devices are NOT all updating automatically:

  • Enterprise‑managed PCs (Intune, Autopatch, Group Policy, SCCM, etc.) do not get forced feature upgrades
  • IT controls:
    • Which version
    • When it deploys
    • Whether it’s phased, blocked, or delayed
      using Windows Update rings and feature update policies [learn.microsoft.com]

So if your Windows 11 machine is:

  • Enrolled in Intune
  • Part of a corporate domain
  • Managed by Autopatch or update rings

…then it only updates when IT allows it, not because Microsoft says “now.”


Why it feels like “everything is updating”

A few things are overlapping right now:

  • Multiple Windows 11 versions hitting end‑of‑service windows
  • A mandatory April 2026 security update (KB5083769) that installs on supported versions [cybersecur...tynews.com]
  • Microsoft expanding automatic upgrades to “all unmanaged Home + Pro devices” in April–May 2026 [pureinfotech.com], [notebookcheck.net]

That combination makes it look like every Windows 11 PC is updating — but the split is really unmanaged vs. managed.


Quick rule of thumb

  • Personal / home PC → ✅ likely updating or will soon
  • Company‑owned / IT‑managed PC → ❌ only updates per IT policy

Chrome and Firefox Browser Updates to address security issues

Chrome version 147 has 30 fixes for security issues.
The latest version of Chrome is 147.0.7727.138
Firefox version 150.0.1 fixes 4 security issues.
Chromium based browsers should follow these fixes soon.

Monday, April 27, 2026

ADT Confirms Data Breach

  ADT confirmed a data breach detected on April 20, 2026, involving unauthorized access to certain cloud‑based environments. The incident has been publicly linked to the ShinyHunters extortion group, which threatened to leak stolen data unless a ransom was paid.

About 5.5 million individuals had data exposed, according to analysis by Have I Been Pwned after reviewing the leaked data.
  • Names
  • Phone numbers
  • Physical addresses

In a small percentage of cases:

  • Dates of birth
  • Last four digits of Social Security numbers or Tax IDs

Not accessed:

  • Credit card or bank information
  • Customer alarm or monitoring systems

Based on standard guidance cited in coverage of the breach:

  • Watch for phishing calls, texts, or emails referencing ADT
  • Monitor credit reports and accounts for unusual activity
  • Take advantage of ADT’s identity‑protection services if offered
  • Check whether your email appears in this breach via Have I Been Pwned


Tuesday, April 21, 2026

Microsoft Patch Tuesday statistics

 

  • The April 14, 2026 Patch Tuesday addressed 167 flaws, including 2 zero‑day vulnerabilities (one actively exploited). 
  • It’s widely reported as one of Microsoft’s largest Patch Tuesday releases to date.
  • Monday, April 20, 2026

    Maryland bans Surveillance pricing

     

    Maryland banned using your personal data to secretly charge you more for groceries than someone else — a first in the U.S.

    Under the Protection from Predatory Pricing Act, Maryland will become the first U.S. state to outlaw this practice in the grocery sector. The law:

    Prohibits

    • Using personal or surveillance data to set individualized grocery prices
    • Charging different people different prices for the same grocery item based on who they are
    • Real‑time price changes driven by consumer profiling

    Requires

    • Grocery prices generally remain fixed for at least one business day, limiting sudden price spikes from digital tag
       

       
       

    Tuesday, April 14, 2026

    Booking.com data breach April 14, 2026

      Customers began receiving notifications April 12-13

    According to Booking.com’s own notifications and follow‑up reporting, the exposed information may include:

    • Names
    • Email addresses
    • Phone numbers
    • Postal addresses
    • Reservation details (dates, property info, itinerary)
    • Messages or notes shared with accommodation providers

    Booking.com has repeatedly stated that payment and credit‑card data were not accessed.

    Booking.com reports it:

    • Reset reservation PIN codes tied to affected bookings
    • Contacted impacted customers directly by email
    • Advised customers to be vigilant for phishing attempts
    • Stated the incident is now “under control”, though investigations are ongoing

    The company has not disclosed:

    • How many customers were affected
    • Exactly when the breach occurred
    • Technical details of how the access happened
    • While no financial data was taken, experts warn that the combination of personal info + travel details makes this breach particularly dangerous. Attackers can craft highly convincing phishing messages (email, SMS, WhatsApp, or phone calls) that reference real bookings.

      Reports already show customers receiving scam contacts pretending to be Booking.com or their hotel, asking for “verification” or payments.

       

      Booking.com has emphasized that it will never:

      • Ask for credit‑card details
      • Request bank transfers
      • Ask for personal information via email, phone, text, or WhatsApp

      Customers are strongly advised not to click links in unsolicited messages claiming to be from Booking.com or properties. 

       

      Based on Booking.com’s guidance and security reporting:

      • ✅ Treat unexpected messages about bookings as suspicious
      • ✅ Verify any issue by logging directly into Booking.com (not via links)
      • ✅ Be cautious of urgent payment or “verification” requests
      • ✅ Monitor email and messaging apps for phishing attempts