QNAP has patched seven zero-day vulnerabilities exploited live at Pwn2Own Ireland 2025, impacting QTS, QuTS hero, and multiple NAS management apps.
The exploits were demonstrated by Summoning Team, DEVCORE, Team DDOS, and CyCraft.
Admins are urged to update to the latest builds immediately.
Follow @technadu for detailed coverage of vendor patch cycles and critical exploit disclosures.

#QNAP #ZeroDay #Pwn2Own #CyberSecurity #InfoSec #DataProtection #PatchTuesday

📰 Samsung's November Security Update Patches 45 Vulnerabilities, Including Critical Android Flaws

Samsung's November 2025 security update is here! 🛡️ It patches 45 vulnerabilities, including Google's critical zero-click RCE (CVE-2025-48593) and flaws in Exynos chips. Update your Galaxy device now! #Samsung #Android #Security #PatchTuesday

🔗 https://cyber.netsecops.io/articles/samsung-releases-november-2025-security-patch-with-45-fixes/?utm_source=mastodon&utm_medium=…

Samsung's November Security Update Patches 45 Vulnerabilities, Including Critical Android Flaws

Samsung's November 2025 security update patches 45 vulnerabilities for Galaxy devices, including critical Android flaws like CVE-2025-48593 and Samsung-specific SVEs.

CyberNetSec.io

Good news for #Windows11 users – #Microsoft’s KB5067036 update finally fixes the ‘Update and Shut Down’ bug where PCs would restart instead. Check your build and apply the patch when it’s available.

Read: https://hackread.com/microsoft-fixe-update-and-shut-down-bug-windows-11/

#Cybersecurity #WindowsUpdate #PatchTuesday #WindowsBug

Microsoft Fixes Long-Standing ‘Update and Shut Down’ Bug in Windows 11

Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread

@USBTypeSteve now it is up to us as security professionals to embarrass them into reversion.

Background: To this day - I am constantly irritated by cyber threat intel organizations that need to have some cutesy nomenclature for naming threat actors. Vendor A calls this group “Energetic Panda” and Vendor B calls this group “APT 420” and Vendor C calls this group “Syphilitic Donkey.” Makes briefing the C suite on actual threats to the enterprise annoying and more challenging than it needs to be.

But I digress.

Solution: I suggest we take this same angst and weaponize it against Microsoft. A simple random word association database can be mapped to KB numbers, of the form Adjective-Noun, where all of the nouns in this case are STDs (STIs for the Brits).
I believe that adoption in the infosec community would likely be organic, given that most of us like a good immature chuckle from time to time.

And I imagine conversations like

"Have you patched against Aggressive Chlamydia yet? I hear that has some critical updates that fix that broke in the Debilitating Herpes!"

"No - you have to patch for Unbearable Gonorrhea first and we've seen that break our production MS SQL DBs hard. There is a workaround, and we've been promised that this will be fixed with Cantankerous Chancroid due out next Tuesday."

#MSPatch #MSKB #PatchTuesday #SyphiliticDonkey

📰 Patch Now: Critical RCE Flaws in Oracle E-Business Suite Marketing Module

🚨 CRITICAL VULNS: Oracle patches two 9.8 CVSS RCE flaws in E-Business Suite Marketing (CVE-2025-53072, CVE-2025-62481). Unauthenticated attacker can gain full system access. Patch immediately! #Oracle #EBS #CVE #PatchTuesday

🔗 https://cyber.netsecops.io/articles/oracle-e-business-suite-hit-by-critical-marketing-module-flaws/?utm_source=mastodon&utm_medium=social&utm_campaign=twitter_auto&utm_content=v1761150863

Patch Now: Critical RCE Flaws in Oracle E-Business Suite Marketing Module

Oracle has patched two critical RCE vulnerabilities (CVE-2025-53072, CVE-2025-62481) with a 9.8 CVSS score in its E-Business Suite Marketing module. Apply the October 2025 CPU immediately to prevent a full system takeover.

CyberNetSec.io

Microsoft blocks File Explorer previews for downloaded files to prevent credential theft ⚠️

Applies to files with Mark of the Web (MotW) 🌐
Windows 11 & Server get automatic protection 🔒
Trusted files can be unblocked manually ✅

🔗 https://www.bleepingcomputer.com/news/microsoft/microsoft-disables-preview-pane-for-downloads-to-block-ntlm-theft-attacks/

#TechNews #CyberSecurity #Windows11 #ITSecurity #DigitalSafety #Malware #CredentialTheft #PatchTuesday #OnlineSafety #Microsoft #FileExplorer #Infosec #DataProtection #ITUpdates #WindowsServer

Microsoft disables File Explorer preview for downloads to block attacks

Microsoft says that the File Explorer (formerly Windows Explorer) now automatically blocks previews for files downloaded from the Internet to block credential theft attacks via malicious documents.

BleepingComputer
🔒 Oracle's Oct 2025 Critical Patch Update fixes 374 vulns, several rated CRITICAL. No active exploits yet, but risk is high for unpatched enterprise systems. Inventory, test, and patch ASAP! https://radar.offseq.com/threat/oracle-releases-october-2025-patches-48725978 #OffSeq #Oracle #Vulnerability #PatchTuesday
This is another one of those updates that makes you wonder what the QA process looks like at Microsoft. Their push to strengthen cryptography (moving from CSP to KSP) is the right idea, but the execution in KB5066835 is a mess. It's effectively a self-inflicted DDoS attack. When a security patch breaks critical smart card authentication, it forces high-security orgs into a terrible choice: roll back the patch or break the business. And breaking the mouse and keyboard in the recovery environment is just salt in the wound.
TL;DR
🧠 The Goal: Move from the older Cryptographic Services Provider (CSP) to the more secure Key Storage Provider (KSP).
⚠️ The Reality: The update is breaking smart card authentication, which is critical for government, defense, and banking.
💻 The Collateral: It's also killing IIS website connections (even localhost) and making USB devices fail in WinRE.
🔧 The "Fix": A combination of messy registry edits and out-of-band patches, with a hard deadline in 2026 when the registry workaround disappears. 
https://www.computerworld.com/article/4075977/security-patch-or-self-inflicted-ddos-microsoft-update-knocks-out-key-enterprise-functions.html
#WindowsUpdate #PatchManagement #Cybersecurity #ITOperations #security #privacy #cloud #infosec #PatchTuesday #Fail
Security patch or self-inflicted DDoS? Microsoft update knocks out key enterprise functions

The transition from CSP to KSP has triggered failures in smart card authentication, IIS connectivity, and recovery mode devices.

Computerworld