Tech Stuff

Microsoft tries to make Linux work.
OOPs
.
.
Screenshot 2025-10-09 at 18-24-08 Facebook.png
 
Next week I'm converting @Poule43 HP Z800 workstation the Linux Mint.
He is currently on Windows 10 and the security updates have stopped.
Should be fun.
 
Five megabyte arriving 60 years ago.
vs 1 TB today.
.
560510393_1252842500198378_2581923874694555097_n.jpg
 
Okay, now I'm pissed. Starlink is reducing speed for my RV from 550 MPH
to a slow 450 MPH. How the Fcuk can I surf porn with that slow fcuking speed.
.
571340956_10237103395420958_6066969540845710513_n.jpg
 
The irony is almost funny... 😏
Microsoft's update server just became the attack vector.
CVE-2025-59287. CVSS 9.8. Actively exploited since October 23.
Let me explain what's happening here.
WSUS is Windows Server Update Services. This is the server that sends security updates to all Windows computers in a company network. One single server pushing updates to hundreds or thousands of machines.
An attacker takes over that WSUS server. Suddenly, they can push fake "updates" to every Windows computer in your network. Game over.
Here's what makes this vulnerability so dangerous. No login needed. Attackers don't need a username or password. They just send a special request to the server, and boom, they can run code with the highest level of access possible.
And it spreads automatically between WSUS servers.
Timeline of this mess:
→ October 14: Vulnerability found
→ October 23: Microsoft releases emergency patch (the first patch didn't even work!)
→ October 24: Active attacks detected in the wild
→ October 24: CISA adds it to its Known Exploited Vulnerabilities list
Real numbers: Google confirmed multiple companies already hacked. Trend Micro detected over 100,000 attack attempts in just 7 days. The Dutch NCSC warned that these are advanced attackers, not beginners playing around.
For beginners wondering if you're affected: Only if you run Windows Server with WSUS turned on. Regular Windows 10 or Windows 11 home users are safe. But if you work in IT? Check your servers right now.
How do attackers actually exploit this? They find an exposed WSUS server on ports 8530 or 8531. They send a special request that tricks the server into running their code with full system access. From there, they install backdoors, steal data, move through your network.
The fix? Well... use Linux. 😁😆
But seriously, if you're stuck with Windows Server: Install Microsoft's October 23 emergency update. Or turn off WSUS for now. Or block ports 8530 and 8531 on your firewall.
Federal agencies have until November 14, 2025 to patch this. That's a CISA order.
The real lesson here? Even your security tools can become attack tools. Update servers, antivirus, and monitoring systems. They all need protection, too. Nothing is safe by default.

 
Back
Top