On July 20th, 2021, KCS was made aware of a vulnerability relating to a local elevation of privileges, which would allow a threat actor to access saved passwords, system decryption keys, and more. It works by exploiting a core file to user accounts and privilege management in Windows. KCS is actively looking into the implementation of the fixes as put out by Microsoft and testing and confirming that these patches remediate the vulnerabilities. If you want to confirm that you've been affected by the vulnerability, please reach out to KCS Computer Tech for a free diagnostic.
For further reading, check out Bleeping Computer's in-depth article: https://www.bleepingcomputer.com/news/microsoft/new-windows-10-vulnerability-allows-anyone-to-get-admin-privileges/
Windows 11 comes with many requirements and surprising loop-hole shutdowns from Microsoft
Windows 10 vulnerability using SAM registry entries allows local elevation privileges