Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for SafePay, DevMan Emer ...

 Cyber News

SafePay’s journey to the top of the ransomware leaderboard was a quick one. The SafePay ransomware group first emerged in the fall of 2024, and last month took the top spot among ransomware groups in the number of victims claimed on their data leak site, according to a Cyble blog post published today. Cyble reported   show more ...

that ransomware groups claimed 384 victims in May, a number that may rise somewhat as all data is processed. That’s the third straight monthly decline for claimed victims, as new leaders continue to emerge after RansomHub – the top ransomware group for more than a year – went offline in late March in a possible attack by rival DragonForce. Cyble also looked at DevMan, another emerging ransomware threat, and other ransomware developments that occurred in May. Top Ransomware Groups and Threats SafePay claimed 58 victims in May to take over the top spot from April leader Qilin, which came in second with 54 victims. Play, Akira and NightSpire rounded out the top five ransomware groups. The U.S. was once again the most targeted country, with 181 victims (charts below from Cyble). [caption id="attachment_103123" align="aligncenter" width="936"] Top ransomware groups May 2025[/caption] [caption id="attachment_103124" align="aligncenter" width="936"] Ransomware attacks by country May 2025[/caption] Professional Services and Construction were the most attacked sectors by all ransomware groups, totaling 101 attacks, followed by Manufacturing, Government, Healthcare, Finance, IT, Transportation, Consumer Goods and Education, Cyble said. SafePay has claimed 198 victims to date. The group’s previous monthly high was 43 victims in March, but May was the first month that SafePay led all ransomware groups. Cyble said SafePay typically obtains initial access to victim environments through VPN and RDP connections, often using stolen credentials or password spraying attacks. The group uses double-extortion techniques – encrypting and threatening to publicly release data – and claims not to offer Ransomware-as-a-Service (RaaS), unlike other ransomware groups that rely on affiliates to spread their malware. Major targets for SafePay include the U.S. and Germany, as well as the Professional Services, Construction, Healthcare, Education and Manufacturing sectors. DevMan, meanwhile, mainly operates as an affiliate of several RaaS groups, but was recently observed deploying its own ransomware that the group claims is capable of faster lateral movement and is implemented via Group Policy Object (GPO). DevMan claimed 13 victims in May, placing it just outside the top five ransomware groups, “and making it one to watch,” Cyble said. As an affiliate, DevMan has worked with Qilin, Apos, DragonForce RaaS and RansomHub. In another significant ransomware development in May, the leak of the VanHelsing Ransomware-as-a-Service (RaaS) source code raises “concerns of potential copycat operations, as observed following the leaks of LockBit and Babuk,” Cyble said. “The widespread availability of VanHelsing’s source code may accelerate the emergence of new ransomware variants in the coming weeks." Cyble also detailed three new ransomware groups, as well as 17 ransomware attacks claimed by ransomware groups, many of which could have significant impact on the software supply chain, critical infrastructure and even military targets. Protecting Against Ransomware Cyble said the rise of new ransomware groups to take the place of former leaders “underscores the ever-present threat of ransomware and highlights the enduring importance of cybersecurity best practices for protecting against a wide range of cyber threats.” Those cybersecurity best practices include a risk-based vulnerability management program; protecting exposed assets; segmenting networks and critical assets; creating ransomware-resistant backups; applying Zero Trust principles; practicing proper configuration and secrets protection; hardening endpoints and infrastructure; and monitoring networks, endpoints and cloud environments.  

image for DollyWay is infectin ...

 Business

Given that just under half of all websites in the world are powered by the WordPress content management system, its no wonder cybercriminals are constantly looking for loopholes to exploit it. This past March, cybersecurity researchers at the hosting company GoDaddy described a campaign that began in 2016 and has   show more ...

since compromised more than 20 000 WordPress websites worldwide. The campaign has been dubbed DollyWay World Domination after a line of code (define (DOLLY_WAY, World Domination)) found in the malware used in this campaign. As part of DollyWay, threat actors inject malicious scripts with various capabilities onto websites. Their main goal is to redirect users from legitimate websites to third-party pages. As of February 2025, experts had recorded over 10 000 infected WordPress websites worldwide. To compromise websites, malicious actors exploit vulnerabilities in WordPress plugins and themes. They start by injecting a harmless-looking script that raises no red flags with security systems performing static HTML code analysis. The script operates as a stealthy infiltrator — quietly downloading more dangerous code used for profiling victims, communicating with command-and-control servers, and ultimately redirecting visitors to infected sites. You can read the original research paper for a detailed description of how these scripts work. Monetizing the malicious campaign Redirect-links generated by DollyWay include an affiliate identifier — much like referral programs that bloggers often use to promote products or services. These identifiers allow websites to track where users are coming from. Bloggers typically earn a commission on purchases made by visitors who arrive through referral links. The DollyWay World Domination Campaign is monetized in much the same way, using the VexTrio and LosPollos affiliate programs. VexTrio has been called the Uber of cybercrime. Reportedly active since at least 2017, this service primarily acts as a broker for scam content, spyware, malware, pornography, and so on. Its VexTrio that redirects the traffic from DollyWay to scam sites. As noted above, the malware profiles its victims. Based on these profiles, users are then funneled to various types of websites, such as fake dating sites, crypto scams, or gambling pages. LosPollos apparently specializes in selling traffic to legitimate services. Whenever DollyWay redirects traffic to a site promoted by LosPollos, the redirects always include the same LosPollos affiliate account identifier. DollyWays partnership with LosPollos explains why, in some cases, redirects from infected sites lead users not to malicious pages, but to legitimate app listings on Google Play such as Tinder or TikTok. How DollyWay conceals itself on websites it has infected Cybercriminals exercise great care to keep their malware from being detected and removed. For starters, the malicious code is injected into every active plugin. Removing it is no walk in the park, as DollyWay employs an advanced re-infection mechanism that triggers every time a page on the compromised site is accessed. If the malicious code isnt removed from all active plugins and snippets, loading any page on the site will result in re-infection. Detecting DollyWay may prove no simple task either — the malware is adept at hiding its presence on an infected site. To maintain access to the compromised site, the attackers create their own account with admin privileges, and DollyWay hides this account from the WordPress dashboard. In case their accounts are discovered, the attackers also hijack the credentials of legitimate administrators. To do this, DollyWay monitors everything entered into the sites admin login form and saves the data to a hidden file. The attackers also take steps to ensure their assets remain operational. Researchers found evidence of a script apparently used by the attackers to maintain infected sites. Specifically, it can update WordPress, install and update required components, and initiate the injection of malicious code. Experts also discovered a web shell that the attackers use, among other things, to update compromised sites and keep away rival malware. This goes to show that the attackers are keen to prevent other malware from hijacking traffic or setting off any security alarms that might alert the site owner. The experts believe that the maintenance script and web shell arent deployed on every site infected by DollyWay. Maintaining such infrastructure across all 10 000 sites would be prohibitively resource-intensive. Chances are, the attackers only deploy these scripts on their most valuable assets. Protecting your corporate website The sheer scale and longevity of the DollyWay World Domination campaign once again underscore the need for regular security audits of company websites. When it comes to WordPress sites, plugins and themes deserve particular attention — theyve repeatedly proven to be the most vulnerable parts of the platforms infrastructure. If you suspect your companys website has fallen victim to DollyWay, researchers recommend keeping a close eye on file creation and deletion events. Such activity can be an indicator of compromise, as some versions of DollyWay v3 perform file operations every time a page is loaded. Here is what you need to do if you come across signs of compromise. Temporarily take the affected site offline, redirecting all traffic to a static page. Or, at the very least, deactivate all plugins while youre removing the malware. Remove any suspicious plugins — but keep in mind that DollyWay knows how to hide them from the WordPress dashboard. Delete any unrecognized administrator accounts — again, be aware that DollyWay can hide these too. Change the passwords for all WordPress users, starting with anyone who has admin privileges. Enable two-factor authentication for WordPress sign-in. If the internal infosec teams resources are insufficient, seek help from third-party incident response specialists.

 Feed

Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild. The high-severity flaw is being tracked as CVE-2025-5419, and has been flagged as an out-of-bounds read and write vulnerability in the V8 JavaScript and WebAssembly engine. "Out of bounds read and write in V8 in Google

 Feed

A growing number of malicious campaigns have leveraged a recently discovered Android banking trojan called Crocodilus to target users in Europe and South America. The malware, according to a new report published by ThreatFabric, has also adopted improved obfuscation techniques to hinder analysis and detection, and includes the ability to create new contacts in the victim's contacts list. "Recent

 Feed

Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing "patterns of concerning behavior observed over the past year." The changes are expected to be introduced in Chrome 139, which is scheduled for public release in early August 2025. The current major version is 137.  The update will affect all Transport Layer Security (TLS)

 Feed

Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies by publishing a new joint threat actor mapping. "By mapping where our knowledge of these actors align, we will provide security professionals with the ability to connect insights faster and make decisions with greater confidence," Vasu Jakkal, corporate vice president at Microsoft

 Feed

In the wake of high-profile attacks on UK retailers Marks & Spencer and Co-op, Scattered Spider has been all over the media, with coverage spilling over into the mainstream news due to the severity of the disruption caused — currently looking like hundreds of millions in lost profits for M&S alone.  This coverage is extremely valuable for the cybersecurity community as it raises

 Feed

Threat hunters are alerting to a new campaign that employs deceptive websites to trick unsuspecting users into executing malicious PowerShell scripts on their machines and infect them with the NetSupport RAT malware. The DomainTools Investigations (DTI) team said it identified "malicious multi-stage downloader Powershell scripts" hosted on lure websites that masquerade as Gitcode and DocuSign. "

 Feed

Cybersecurity researchers have disclosed details of a critical security flaw in the Roundcube webmail software that has gone unnoticed for a decade and could be exploited to take over susceptible systems and execute arbitrary code. The vulnerability, tracked as CVE-2025-49113, carries a CVSS score of 9.9 out of 10.0. It has been described as a case of post-authenticated remote code execution via

 AI

In episode 53 of The AI Fix, our hosts suspect the CEO of Duolingo has been kidnapped by an AI, Sergey Brin says AIs work better if you threaten them with physical violence, Graham wonders how you put a collar on a headless robot dog, Mark asks why kickboxing robots wear head guards, and the CEO of Anthropic says AI   show more ...

could wipe out entry-level jobs. Graham asks your favourite AI how it feels about being kidnapped, and Mark explains how an AI tried to save itself by blackmailing the engineer responsible for turning it off. All this and much more is discussed in the latest edition of "The AI Fix" podcast by Graham Cluley and Mark Stockley.

 1 - Cyber Security News Post

Source: hackread.com – Author: Owais Sultan. Litecoin (LTC), often called the “silver to Bitcoin’s gold,” has long been popular for its speed, lower transaction fees, and reliable track record. But as its popularity grows, so do the risks. Whether you’re a newcomer or a seasoned crypto user,   show more ...

understanding how to protect your Litecoin is essential […] La entrada How to Keep Your Litecoin Safe: A Practical Guide – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. Qualys details CVE-2025-5054 and CVE-2025-4598, critical vulnerabilities affecting Linux crash reporting tools like Apport and systemd-coredump. Learn how to protect your Ubuntu, Red Hat, and Fedora systems. Cybersecurity experts at Qualys have uncovered two   show more ...

significant weaknesses in common Linux operating systems. These information disclosure vulnerabilities, found in software tools […] La entrada Linux Crash Reporting Flaws (CVE-2025-5054, 4598) Expose Password Hashes – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. The US Department of the Treasury has taken action against Funnull Technology Inc. for enabling massive pig butchering crypto scams. This move targets the backbone of fraudulent virtual currency investment platforms, aiming to protect Americans from billions in losses.   show more ...

The US government has taken a major step to fight […] La entrada US Sanctions Philippines’ Funnull Technology Over $200M Crypto Scam – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Deeba Ahmed. An Iranian man has admitted his role in a major international ransomware operation that caused tens of millions of dollars in damages and severely disrupted public services across the United States. Sina Gholinejad, 37, entered a guilty plea on Tuesday, May 27, 2025,   show more ...

for his part in deploying the […] La entrada Iranian Robbinhood Ransomware Operator Pleads Guilty in US City Attacks – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: hackread.com – Author: Owais Sultan. Among all ages, Minecraft still rules the gaming scene as a preferred choice. The game provides a broad spectrum of activities from building huge constructions and joining multiplayer servers to investigating blocky environments. But your PC configuration is more   show more ...

important than you would realize for seamless, lag-free gameplay. Minecraft […] La entrada Maximize Your Minecraft: Optimal PC Setup and Server Hosting Essentials – Source:hackread.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cryptojacking

Source: thehackernews.com – Author: . Cybersecurity researchers have discovered a new cryptojacking campaign that’s targeting publicly accessible DevOps web servers such as those associated with Docker, Gitea, and HashiCorp Consul and Nomad to illicitly mine cryptocurrencies. Cloud security firm Wiz,   show more ...

which is tracking the activity under the name JINX-0132, said the attackers are exploiting a […] La entrada Cryptojacking Campaign Exploits DevOps APIs Using Off-the-Shelf Tools from GitHub – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Three security vulnerabilities have been disclosed in preloaded Android applications on smartphones from Ulefone and Krüger&Matz that could enable any app installed on the device to perform a factory reset and encrypt an application. A brief description of the three   show more ...

flaws is as follows – CVE-2024-13915 (CVSS score: 6.9) – […] La entrada Preinstalled Apps on Ulefone, Krüger&Matz Phones Let Any App Reset Device, Steal PIN – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Qualcomm has shipped security updates to address three zero-day vulnerabilities that it said have been exploited in limited, targeted attacks in the wild. The flaws in question, which were responsibly disclosed to the company by the Google Android Security team, are listed   show more ...

below – CVE-2025-21479 and CVE-2025-21480 (CVSS score: 8.6) […] La entrada Qualcomm Fixes 3 Zero-Days Used in Targeted Android Attacks via Adreno GPU – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . If this had been a security drill, someone would’ve said it went too far. But it wasn’t a drill—it was real. The access? Everything looked normal. The tools? Easy to find. The detection? Came too late. This is how attacks happen now—quiet, convincing, and fast.   show more ...

Defenders aren’t just chasing hackers […] La entrada ⚡ Weekly Recap: APT Intrusions, AI Malware, Zero-Click Exploits, Browser Hijacks and More – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As attackers become more sophisticated — leveraging encryption, living-off-the-land techniques, and lateral movement to evade traditional defenses —   show more ...

security teams are finding more threats wreaking havoc before they can be detected. Even after an […] La entrada The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Arielle Waldman Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the security   show more ...

solution. There are several actions that could trigger this […] La entrada EMR-ISAC Shuts Down: What Happens Now? – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Jai Vijayan, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the   show more ...

security solution. There are several actions that could […] La entrada Exploitation Risk Grows for Critical Cisco Bug – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: www.darkreading.com – Author: Alexander Culafi, Senior News Writer, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just   show more ...

performed triggered the security solution. There are several […] La entrada Trickbot, Conti Ransomware Operator Unmasked Amid Huge Ops Leak – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Australia

Source: www.darkreading.com – Author: Kristina Beek, Associate Editor, Dark Reading Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed   show more ...

triggered the security solution. There are several actions […] La entrada Australia Begins New Ransomware Payment Disclosure Rules – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Critical

Source: www.darkreading.com – Author: Elizabeth Montalbano, Contributing Writer Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed   show more ...

triggered the security solution. There are several actions that could […] La entrada Critical Bugs Could Spark Takeover of Widely Used Fire Safety OT/ICS Platform – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Beyond

Source: www.darkreading.com – Author: Tim Freestone Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution.   show more ...

There are several actions that could trigger this […] La entrada Beyond the Broken Wall: Why the Security Perimeter Is Not Enough – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 China

Source: www.darkreading.com – Author: Andrew Grotto Please enable cookies. Sorry, you have been blocked You are unable to access darkreading.com Why have I been blocked? This website is using a security service to protect itself from online attacks. The action you just performed triggered the security solution.   show more ...

There are several actions that could trigger this […] La entrada In the AI Race With China, Don’t Forget About Security – Source: www.darkreading.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 1 - Cyber Security News Post

Source: www.mcafee.com – Author: Jasdev Dhaliwal. In a significant security incident, Coinbase, a leading cryptocurrency trading platform, recently disclosed a data breach impacting nearly 70,000 users. This breach, attributed to “insider wrongdoing,” exposed sensitive personal information. This post   show more ...

details how the breach occurred, what data was compromised, and, most importantly, provides crucial steps you can […] La entrada How to Protect Your Crypto After the Coinbase Breach – Source:www.mcafee.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Eric Olden AI agents are becoming the new interface for enterprise work, helping teams write code, automate operations, and execute transactions. But as organizations lean into Agentic AI, a foundational blind spot is coming into view: Today’s identity systems were   show more ...

built for humans, not autonomous agents. While agents now act with […] La entrada The identity crisis at the heart of the AI agent revolution – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: securityboulevard.com – Author: Eric Olden As AI agents rapidly move from proof-of-concept to production, enterprises are running headfirst into a new set of challenges — ones that traditional identity and access management (IAM) systems simply weren’t built to solve. These agents don’t live in a   show more ...

single cloud. They span on-prem infrastructure, edge networks, and […] La entrada The hidden identity challenges of deploying AI agents across hybrid environments – Source: securityboulevard.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 0CISO2CISO

SWE’s free precollege program connects kids to other like-minded students, mentors, and engineering professionals to empower them to explore the world of STEM. Source Views: 0 La entrada SWENext Inspires Young Students to Become STEM Stars se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Android

Source: thehackernews.com – Author: . A growing number of malicious campaigns have leveraged a recently discovered Android banking trojan called Crocodilus to target users in Europe and South America. The malware, according to a new report published by ThreatFabric, has also adopted improved obfuscation   show more ...

techniques to hinder analysis and detection, and includes the ability to […] La entrada Android Trojan Crocodilus Now Active in 8 Countries, Targeting Banks and Crypto Wallets – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Google has revealed that it will no longer trust digital certificates issued by Chunghwa Telecom and Netlock citing “patterns of concerning behavior observed over the past year.” The changes are expected to be introduced in Chrome 139, which is scheduled for   show more ...

public release in early August 2025. The current major […] La entrada Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: thehackernews.com – Author: . Microsoft and CrowdStrike have announced that they are teaming up to align their individual threat actor taxonomies by publishing a new joint threat actor mapping. “By mapping where our knowledge of these actors align, we will provide security professionals with the   show more ...

ability to connect insights faster and make decisions with […] La entrada Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Chrome

Source: thehackernews.com – Author: . Google on Monday released out-of-band fixes to address three security issues in its Chrome browser, including one that it said has come under active exploitation in the wild. The high-severity flaw is being tracked as CVE-2025-5419 (CVSS score: 8.8), and has been   show more ...

flagged as an out-of-bounds read and write vulnerability in […] La entrada New Chrome Zero-Day Actively Exploited; Google Issues Emergency Out-of-Band Patch – Source:thehackernews.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Brandon Vigliarolo Elon Musk’s X social media platform is rolling out a new version of its direct messaging feature that the platform owner said had a “whole new architecture,” but as with many a Muskian proclamation, there’s reason to doubt   show more ...

what’s been said.  Dubbed “XChat” (not to be confused with the […] La entrada X’s new ‘encrypted’ XChat feature seems no more secure than the failure that came before it – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Crooks

Source: go.theregister.com – Author: Connor Jones Joining the long queue of retailers dealing with cyber mishaps is outdoorsy fashion brand The North Face, which says crooks broke into some customer accounts using login creds pinched from breaches elsewhere. According to a consumer notice filed with the Vermont   show more ...

Attorney General’s Office, the outdoor gear seller spotted […] La entrada Crooks fleece The North Face accounts with recycled logins – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

 Cyber Security News

Source: go.theregister.com – Author: Richard Speed Microsoft is patching another patch that dumped some PCs into recovery mode with an unhelpful error code. The glitch was caused by the May Patch Tuesday update, which failed to install on a small number of Windows 11 machines. The broken patch mostly hurt   show more ...

virtual boxes, leaving them in […] La entrada Microsoft patches the patch that put Windows 11 in a coma – Source: go.theregister.com se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

2025-06
Aggregator history
Tuesday, June 03
SUN
MON
TUE
WED
THU
FRI
SAT
JuneJulyAugust