digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

810
active users

#windowsserver

1 post1 participant0 posts today
Alex<p>Hab ich eigentlich schon mal erwähnt dass WSUS der größte Scheißdreck ist, den Microsoft hervorbrachte?<br><a href="https://mastodon.social/tags/wsus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>wsus</span></a> <a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.social/tags/windowsserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsserver</span></a></p>
WinFuture.de<p>Microsoft hat einen kritischen Fehler in <a href="https://mastodon.social/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> 2019 behoben, der seit dem Juli-Update Cluster-Dienste lahmlegte. Das Update KB5063877 beseitigt die Probleme. <a href="https://winfuture.de/news,152952.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,152952.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
Pyrzout :vm:<p>Win-DDoS: Attackers can turn public domain controllers into DDoS agents <a href="https://www.helpnetsecurity.com/2025/08/11/win-ddos-domain-controllers-ddos-vulnerability-cve-2025-32724/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/08/11</span><span class="invisible">/win-ddos-domain-controllers-ddos-vulnerability-cve-2025-32724/</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> <a href="https://social.skynetcloud.site/tags/enterprise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>enterprise</span></a> <a href="https://social.skynetcloud.site/tags/SafeBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SafeBreach</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://social.skynetcloud.site/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://social.skynetcloud.site/tags/DoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DoS</span></a></p>
komm @ WHY2025<p>Vertrauensstellungen zwischen zwei Windows-Domänen kann man auch bei einseitigem Vertrauen ausnutzen. </p><p>Beim Windows Server 2025 gab es ein paar Änderungen - das haben wir direkt mal ausprobiert und das Kerberoasting klappt auch weiterhin mit dem Trust-Account. Damit kann man auch beim Windows Server 2025 zwischen den Domänen springen.</p><p>Ich hab das mal in unserem Blogpost angepasst: <a href="https://research.hisolutions.com/2025/06/windows-angriffe-entgegen-der-vertrauensstellung/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">research.hisolutions.com/2025/</span><span class="invisible">06/windows-angriffe-entgegen-der-vertrauensstellung/</span></a></p><p><a href="https://berlin.social/tags/Kerberos" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kerberos</span></a> <a href="https://berlin.social/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> <a href="https://berlin.social/tags/WindowsServer2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer2025</span></a></p>
Bernhard Anreiter<p>Angeblich soll der neue Windows Server 2025 deutlich mehr NVMe-Performance liefern. Leider kann ich das nicht bestätigen. Die Performance unseres Speicherpools (Mirror, feste Größe, ReFS) war nahezu identisch mit der von Windows Server 2022. Nach dem Inplace-Upgrade traten stattdessen Probleme mit Drittanbieter-Serverdiensten auf, weshalb wir den Server wieder auf 2022 zurücksetzen mussten.<br> <br><a href="https://mastodon.social/tags/microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microsoft</span></a> <a href="https://mastodon.social/tags/windowsserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsserver</span></a> <a href="https://mastodon.social/tags/windowsserver2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsserver2025</span></a> <a href="https://mastodon.social/tags/nvme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>nvme</span></a></p>
ocdtrekkie<p>Microsoft apparently decided to install "Edge Game Assist" on Windows Server 2022 for... reasons, I guess. Just in case your domain controller needs this *very cool* feature:</p><p><a href="https://www.microsoft.com/en-us/edge/features/game-assist" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">microsoft.com/en-us/edge/featu</span><span class="invisible">res/game-assist</span></a></p><p><a href="https://mastodon.social/tags/windowsserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windowsserver</span></a> <a href="https://mastodon.social/tags/windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>windows</span></a> <a href="https://mastodon.social/tags/sysadmin" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sysadmin</span></a></p>
iX Magazin<p>heise+ | Windows Server Update Services: Vier moderne Alternativen vorgestellt</p><p>Microsoft stellt die Windows Server Update Services ein. Noch funktioniert WSUS, aber Administratoren müssen nach Ersatz suchen. Microsoft bietet Nachfolger an.</p><p><a href="https://www.heise.de/ratgeber/Windows-Server-Update-Services-Vier-moderne-Alternativen-vorgestellt-10477299.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/ratgeber/Windows-Serv</span><span class="invisible">er-Update-Services-Vier-moderne-Alternativen-vorgestellt-10477299.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/CloudComputing" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CloudComputing</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.heise.de/tags/MicrosoftAzure" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftAzure</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Pyrzout :vm:<p>Microsoft fixes critical wormable Windows flaw (CVE-2025-47981) <a href="https://www.helpnetsecurity.com/2025/07/09/microsoft-fixes-critical-wormable-windows-flaw-cve-2025-47981/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/07/09</span><span class="invisible">/microsoft-fixes-critical-wormable-windows-flaw-cve-2025-47981/</span></a> <a href="https://social.skynetcloud.site/tags/MicrosoftEdge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftEdge</span></a> <a href="https://social.skynetcloud.site/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> <a href="https://social.skynetcloud.site/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchTuesday</span></a> <a href="https://social.skynetcloud.site/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.skynetcloud.site/tags/TrendMicro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrendMicro</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/MSOffice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSOffice</span></a> <a href="https://social.skynetcloud.site/tags/Tenable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tenable</span></a> <a href="https://social.skynetcloud.site/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.skynetcloud.site/tags/Ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ivanti</span></a> <a href="https://social.skynetcloud.site/tags/Qualys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qualys</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
WinFuture.de<p>Microsoft aktualisiert die Sicherheits-Baseline für <a href="https://mastodon.social/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> 2025. Die Juni-Revision (v2506) entfernt die veraltete WDigest-Authentifizierung und verbessert die Prozessüberwachung für mehr Sicherheit. <a href="https://winfuture.de/news,151870.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,151870.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://social.restless.systems/@CursedSilicon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>CursedSilicon</span></a></span> <span class="h-card" translate="no"><a href="https://mspsocial.net/@jima" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>jima</span></a></span> <span class="h-card" translate="no"><a href="https://meow.social/@Tvorsk" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Tvorsk</span></a></span> <span class="h-card" translate="no"><a href="https://linh.social/@qlp" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>qlp</span></a></span> <em>yes</em> because <a href="https://infosec.space/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> is a piece of shit and should not exst to begin with!</p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@cR0w" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cR0w</span></a></span> not really...</p><p>Obviously it's the #1 target and every <a href="https://infosec.space/tags/Skiddie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Skiddie</span></a> has their own index of <a href="https://infosec.space/tags/WordPress" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WordPress</span></a> sites waiting to deploy their <a href="https://infosec.space/tags/Cryptojacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryptojacking</span></a> <a href="https://infosec.space/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a> the second they get their hands on an exploit before people have patched it, but the same applies to <a href="https://infosec.space/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> (espechally <a href="https://infosec.space/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a>!) and other shitty applications...</p>
WinFuture.de<p>Vier neue dynamische <a href="https://mastodon.social/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> für <a href="https://mastodon.social/tags/Windows10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows10</span></a> und <a href="https://mastodon.social/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> sind verfügbar. <a href="https://mastodon.social/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> zielt mit den Aktualisierungen auf Verbesserungen der Wiederherstellungsumgebung <a href="https://mastodon.social/tags/WinRE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WinRE</span></a>. <a href="https://winfuture.de/news,151570.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,151570.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> fixes <a href="https://mastodon.thenewoil.org/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> auth issues caused by April updates</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-windows-server-auth-issues-caused-by-april-updates/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/micr</span><span class="invisible">osoft/microsoft-fixes-windows-server-auth-issues-caused-by-april-updates/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a></p>
Pyrzout :vm:<p>Microsoft fixes zero-day exploited for cyber espionage (CVE-2025-33053) <a href="https://www.helpnetsecurity.com/2025/06/11/microsoft-fixes-zero-day-exploited-for-cyber-espionage-cve-2025-33053/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/06/11</span><span class="invisible">/microsoft-fixes-zero-day-exploited-for-cyber-espionage-cve-2025-33053/</span></a> <a href="https://social.skynetcloud.site/tags/securityupdate" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityupdate</span></a> <a href="https://social.skynetcloud.site/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> <a href="https://social.skynetcloud.site/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchTuesday</span></a> <a href="https://social.skynetcloud.site/tags/CheckPoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CheckPoint</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/MSOffice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSOffice</span></a> <a href="https://social.skynetcloud.site/tags/Magento" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Magento</span></a> <a href="https://social.skynetcloud.site/tags/Tenable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tenable</span></a> <a href="https://social.skynetcloud.site/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.skynetcloud.site/tags/Akamai" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Akamai</span></a> <a href="https://social.skynetcloud.site/tags/Adobe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Adobe</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
computing competence<a href="https://feinste-netzwerke.de?t=wochenbericht" class="mention hashtag" rel="nofollow noopener" target="_blank">#Wochenbericht</a> KW23:<br><br>- Mo: Vorbereitung Laptop per <a href="https://feinste-netzwerke.de?t=openvpn" class="mention hashtag" rel="nofollow noopener" target="_blank">#OpenVPN</a> für <a href="https://feinste-netzwerke.de?t=homeoffice" class="mention hashtag" rel="nofollow noopener" target="_blank">#Homeoffice</a>. <a href="https://feinste-netzwerke.de?t=update" class="mention hashtag" rel="nofollow noopener" target="_blank">#Update</a> einer <a href="https://feinste-netzwerke.de?t=zeiterfassung" class="mention hashtag" rel="nofollow noopener" target="_blank">#Zeiterfassung</a>. <a href="https://feinste-netzwerke.de?t=mailstore" class="mention hashtag" rel="nofollow noopener" target="_blank">#Mailstore</a> neu an <a href="https://feinste-netzwerke.de?t=m365" class="mention hashtag" rel="nofollow noopener" target="_blank">#M365</a> angebunden<br>- Di: Aufbau einer <a href="https://feinste-netzwerke.de?t=usv" class="mention hashtag" rel="nofollow noopener" target="_blank">#USV</a> und Datenmigration von <a href="https://feinste-netzwerke.de?t=synology" class="mention hashtag" rel="nofollow noopener" target="_blank">#Synology</a> auf <a href="https://feinste-netzwerke.de?t=truenas" class="mention hashtag" rel="nofollow noopener" target="_blank">#TrueNAS</a>. Installation einer Testumgebung mit <a href="https://feinste-netzwerke.de?t=windowsserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#WindowsServer</a><br>- Mi: Beratung rund um <a href="https://feinste-netzwerke.de?t=webserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#Webserver</a>, die am besten in einer <a href="https://feinste-netzwerke.de?t=dmz" class="mention hashtag" rel="nofollow noopener" target="_blank">#DMZ</a> landen sollten, so wie <a href="https://feinste-netzwerke.de?t=netzwerksegmentierung" class="mention hashtag" rel="nofollow noopener" target="_blank">#Netzwerksegmentierung</a> im allgemeinen. <a href="https://feinste-netzwerke.de?t=firewall" class="mention hashtag" rel="nofollow noopener" target="_blank">#Firewall</a> Regeln dürfen dabei nicht vergessen werden. Einsatz der Testumgegung von Dienstag. Aufbau neuer PC und Datenübernahme<br>- Do: Fehlersuche <a href="https://feinste-netzwerke.de?t=sip" class="mention hashtag" rel="nofollow noopener" target="_blank">#SIP</a> Trunks. Neuen <a href="https://feinste-netzwerke.de?t=unifi" class="mention hashtag" rel="nofollow noopener" target="_blank">#Unifi</a> Acces Point eingebunden<br>- Fr: Aufwendige <a href="https://feinste-netzwerke.de?t=email" class="mention hashtag" rel="nofollow noopener" target="_blank">#EMail</a> Migration von All-Inkl zu Strato mit wunderbare Migrationsassistent. Backup mit <a href="https://feinste-netzwerke.de?t=offlineimap" class="mention hashtag" rel="nofollow noopener" target="_blank">#offlineimap</a><br><br><a href="https://feinste-netzwerke.de?t=highlight" class="mention hashtag" rel="nofollow noopener" target="_blank">#Highlight</a>: Erste Updates von <a href="https://feinste-netzwerke.de?t=opnsense" class="mention hashtag" rel="nofollow noopener" target="_blank">#OPNsense</a> <a href="https://feinste-netzwerke.de?t=firewalls" class="mention hashtag" rel="nofollow noopener" target="_blank">#Firewalls</a> durch das neue <a href="https://feinste-netzwerke.de?t=personal" class="mention hashtag" rel="nofollow noopener" target="_blank">#Personal</a>. Prima!<br>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://hostsharing.coop/@cdonat" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>cdonat</span></a></span> <span class="h-card" translate="no"><a href="https://toots.ch/@dalai" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>dalai</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@ip6li" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>ip6li</span></a></span> also ich würde darüber garnicht erst diskutieren:</p><p>Entweder fliegt sower hochkant und ich krieg' den Job &amp; Gehalt oder ich gehe und das <a href="https://infosec.space/tags/BSI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BSI</span></a> zerlegt den Laden so heftig dass keiner der CxO's mehr irgendwo nen Job bekommt, noch nichtmals als Lieferfahrer*in!</p><p><a href="https://infosec.space/@kkarhan/114621798932871398" translate="no" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.space/@kkarhan/1146217</span><span class="invisible">98932871398</span></a></p><p>Ich meine wo kommen wir da hin? Leute die <a href="https://infosec.space/tags/NanoCore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NanoCore</span></a> unsarkastisch zur <a href="https://infosec.space/tags/Administration" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Administration</span></a> von <em>'<a href="https://infosec.space/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a>"</em> nutzen?</p><p><a href="https://infosec.space/tags/NotLegalAdvice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NotLegalAdvice</span></a> <a href="https://infosec.space/tags/Sarkasmus" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sarkasmus</span></a> <a href="https://infosec.space/tags/ITsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITsec</span></a> <a href="https://infosec.space/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.space/tags/OpSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpSec</span></a> <a href="https://infosec.space/tags/ComSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ComSec</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a>: Außerplanmäßige Updates für <a href="https://social.tchncs.de/tags/WindowsServer2022" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer2022</span></a> und <a href="https://social.tchncs.de/tags/Windows10" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows10</span></a> | heise online <a href="https://www.heise.de/news/Microsoft-Ausserplanmaessige-Updates-fuer-Windows-Server-2022-und-Windows-10-10396092.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Microsoft-Ausser</span><span class="invisible">planmaessige-Updates-fuer-Windows-Server-2022-und-Windows-10-10396092.html</span></a> <a href="https://social.tchncs.de/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> <a href="https://social.tchncs.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> :windows: <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/WindowsServer2025" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer2025</span></a>: Rechteausweitungslücke im AD | Security <a href="https://www.heise.de/news/Windows-Server-2025-Rechteausweitungsluecke-im-AD-10397566.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Windows-Server-2</span><span class="invisible">025-Rechteausweitungsluecke-im-AD-10397566.html</span></a> <a href="https://social.tchncs.de/tags/BadSuccessor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BadSuccessor</span></a> <a href="https://social.tchncs.de/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> <a href="https://social.tchncs.de/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://social.tchncs.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> :windows: <a href="https://social.tchncs.de/tags/MicrosoftWindows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftWindows</span></a></p>
heise online English<p>Windows Server 2025: Rights extension gap in AD</p><p>Akamai warns of an unpatched privilege escalation vulnerability in Windows Server 2025. Admins need to take action.</p><p><a href="https://www.heise.de/en/news/Windows-Server-2025-Rights-extension-gap-in-AD-10397993.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Windows-Serve</span><span class="invisible">r-2025-Rights-extension-gap-in-AD-10397993.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>Windows Server 2025: Rechteausweitungslücke im AD</p><p>Akamai warnt vor einer ungepatchten Rechteausweitungslücke in Windows Server 2025. Admins müssen aktiv werden.</p><p><a href="https://www.heise.de/news/Windows-Server-2025-Rechteausweitungsluecke-im-AD-10397566.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Windows-Server-2</span><span class="invisible">025-Rechteausweitungsluecke-im-AD-10397566.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/ActiveDirectory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ActiveDirectory</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.heise.de/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>