Microsoft just confirmed a bug affecting DHCP on all major Windows Server versions (2016–2025). Clients may fail to renew IPs after applying June 2025 updates.
🛠️ Fix is on the way.
Stay safe,
Dave
#PatchTuesday #HorizonAlert
Microsoft just confirmed a bug affecting DHCP on all major Windows Server versions (2016–2025). Clients may fail to renew IPs after applying June 2025 updates.
🛠️ Fix is on the way.
Stay safe,
Dave
#PatchTuesday #HorizonAlert
SAP is having a rough season.
Another critical vulnerability just dropped — in 𝗦𝗔𝗣 𝗡𝗲𝘁𝗪𝗲𝗮𝘃𝗲𝗿 (𝟵.𝟲), involving missing authorization checks. Rated highly for a reason.
There’s more in this month’s advisory, but this one definitely stands out.
📎 support.sap.com/en/my-suppor...
#SAP
SAP is having a rough season.
Another critical vulnerability just dropped — in 𝗦𝗔𝗣 𝗡𝗲𝘁𝗪𝗲𝗮𝘃𝗲𝗿 (𝟵.𝟲), involving missing authorization checks. Rated highly for a reason.
There’s more in this month’s advisory, but this one definitely stands out.
📎 support.sap.com/en/my-suppor...
#SAP
✔️ Firewall profile issue on Windows Server 2025 DCs
✔️ Kerberos cert-based auth issues (WHfB, Device PKINIT)
Both resolved in the 𝗝𝘂𝗻𝗲 𝟮𝟬𝟮𝟱 updates ✅
📬 You can subscribe to my newsletter to get all the details as soon as possible.
#PatchTuesday
✔️ Firewall profile issue on Windows Server 2025 DCs
✔️ Kerberos cert-based auth issues (WHfB, Device PKINIT)
Both resolved in the 𝗝𝘂𝗻𝗲 𝟮𝟬𝟮𝟱 updates ✅
📬 You can subscribe to my newsletter to get all the details as soon as possible.
#PatchTuesday
→ SMB privilege escalation (CVE-2025-33073)
→ WebDAV RCE (CVE-2025-33053) – actively exploited!
Network-based, low complexity.
📩 Full breakdown in Horizon Alert.
horizon-secured.com/newsletter/
#CyberSecurity #ZeroDay
→ SMB privilege escalation (CVE-2025-33073)
→ WebDAV RCE (CVE-2025-33053) – actively exploited!
Network-based, low complexity.
📩 Full breakdown in Horizon Alert.
horizon-secured.com/newsletter/
#CyberSecurity #ZeroDay
techcommunity.microsoft.com/t5/itops-tal...
techcommunity.microsoft.com/t5/itops-tal...
A low-priv user with delegated rights (e.g. OU control) can create a DMSA that impersonates any AD account.
This is a stealthy privilege escalation path.
Details 👉 www.akamai.com/blog/securit...
#WindowsServer2025 #ActiveDirectory
A low-priv user with delegated rights (e.g. OU control) can create a DMSA that impersonates any AD account.
This is a stealthy privilege escalation path.
Details 👉 www.akamai.com/blog/securit...
#WindowsServer2025 #ActiveDirectory
support.microsoft.com/en-us/topic/...
support.microsoft.com/en-us/topic/...
pupuweb.com/has-lockbits...
pupuweb.com/has-lockbits...
www.bleepingcomputer.com/news/microso...
This is creative from the attackers side.
www.bleepingcomputer.com/news/microso...
This is creative from the attackers side.
5 exploited
4 = gain SYSTEM privileges
Targets: CLFS, DWM, Defender, Visual Studio
You don't have time to dig — I do.
Subscribe for full alerts:
👉 horizon-secured.com/newsletter/
#CyberSecurity #ZeroDay #Infosec #PatchTuesday
5 exploited
4 = gain SYSTEM privileges
Targets: CLFS, DWM, Defender, Visual Studio
You don't have time to dig — I do.
Subscribe for full alerts:
👉 horizon-secured.com/newsletter/
#CyberSecurity #ZeroDay #Infosec #PatchTuesday
𝗦𝗜𝗗 𝗛𝗶𝘀𝘁𝗼𝗿𝘆 𝗰𝗮𝗻 𝗯𝗲 𝗮 𝗱𝗮𝗻𝗴𝗲𝗿𝗼𝘂𝘀 𝗮𝘁𝘁𝗿𝗶𝗯𝘂𝘁𝗲.
Do you use it in your environment?
Originally, SID History was used during Active Directory migrations—to let migrated users access old resources by injecting old SIDs into the SIDHistory attribute.
𝗦𝗜𝗗 𝗛𝗶𝘀𝘁𝗼𝗿𝘆 𝗰𝗮𝗻 𝗯𝗲 𝗮 𝗱𝗮𝗻𝗴𝗲𝗿𝗼𝘂𝘀 𝗮𝘁𝘁𝗿𝗶𝗯𝘂𝘁𝗲.
Do you use it in your environment?
Originally, SID History was used during Active Directory migrations—to let migrated users access old resources by injecting old SIDs into the SIDHistory attribute.
This was so dangerous they are disabling SAM-R queries in the coming weeks. Only classic sensor is affected, not XDR agent sensor (3.x).
learn.microsoft.com/...
Wait, what?
STORY: www.windowscentral.com/software-app... 🪳
Wait, what?
STORY: www.windowscentral.com/software-app... 🪳
hackread.com/legacy-login...
hackread.com/legacy-login...
A crazy coincidence if true.
A crazy coincidence if true.
@microsoft.com @mscommunity.bsky.social @mvpaward.bsky.social #Microsoft #ActiveDirectory #mvpbuzz #coolstuff #ADDS #Windows #WindowsServer
👇👇👇👇
techcommunity.microsoft.com/t5/windows-s...
@microsoft.com @mscommunity.bsky.social @mvpaward.bsky.social #Microsoft #ActiveDirectory #mvpbuzz #coolstuff #ADDS #Windows #WindowsServer
👇👇👇👇
techcommunity.microsoft.com/t5/windows-s...
If you are using telnet on Windows, this should be the top priority for you right now:
securityonline.info/0-click-ntlm...
If you are using telnet on Windows, this should be the top priority for you right now:
securityonline.info/0-click-ntlm...
“The trust relationship between this workstation and the primary domain failed.”
Do you really understand what this message means? Let’s break it down. 👇
#Windows #ActiveDirectory
“The trust relationship between this workstation and the primary domain failed.”
Do you really understand what this message means? Let’s break it down. 👇
#Windows #ActiveDirectory
URL: nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Not Defined, Exploit Maturity: Not Defined, CVSSv3.1: 10.0
CVEs: CVE-2025-31324
URL: nvd.nist.gov/vuln/detail/...
Classification: Critical, Solution: Not Defined, Exploit Maturity: Not Defined, CVSSv3.1: 10.0
CVEs: CVE-2025-31324