Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Yet Another SMB-Related CVE

CISA has just added a new CVE regarding SMB, with a very high CVSS rating. CVE-2025-33073 is a high-severity (CVSS 8.8) vulnerability in the Windows SMB client caused by improper access control (CWE-284). An authenticated attacker can exploit it over the network to gain elevated privileges. Microsoft has issued guidance on how it should be patched and CalCom recommend this be done immediately.

Windows 10 End of Support: How to Stay Protected

Today marks a significant milestone in the technology landscape. As of October 14, 2025, Microsoft has officially ended support for non-LTSC releases of Windows 10, concluding one of the most widely adopted operating systems in history. From this point forward, the operating system will no longer receive security updates or feature patches by default. While Microsoft offers Extended Security Updates (ESUs) for Windows 10 version 22H2, these are temporary and designed as a bridge solution.

Windows 10 Retirement: A Reminder for Managing Legacy Industrial Control Systems (ICS)

On October 14th, Windows 10 will be retired, and Microsoft will no longer push patches or updates to systems on that operating system. It is crucial for companies to make the jump to Windows 11 now—or risk being exposed to critical vulnerabilities. This is especially important for Industrial Control Systems (ICS), which often run on legacy systems.

To the Point: 11th Hour No More - How Fulton County Beat the Windows 11 Clock

With Microsoft officially ending support for many Windows 10 versions on October 14, 2025, public sector organizations are racing to modernize their environments. But Fulton County, Georgia, isn’t racing—they’re leading. In this episode, we sit down with Terrence Slaton, CISO of Fulton County, to unpack how his team successfully executed a large-scale migration to Windows 11 across critical government systems—with speed, certainty, and zero disruption to essential services.

How to Disable USB Ports on Windows 11: The Complete Guide (2025)

Unsecured USB ports on Windows devices pose significant security risks, from data theft to malware injection, making robust control essential for data loss prevention (DLP) and regulatory compliance. Basic methods exist within Windows 10/11 itself, such as using Device Manager, Registry Editor, or Group Policy Editor. These built-in options often lack centralized management, specific device whitelisting, and temporary access features necessary for comprehensive enterprise-level security.

Microsoft Kills the Blue Screen of Death After 40 Years: Meet the New Black Screen of Death

Microsoft just made history. But not the kind you’re used to. For nearly four decades, the Blue Screen of Death (BSOD) haunted Windows users. One minute you’re sipping coffee. Next, your screen goes blue with a sad emoji and cryptic codes. However, Microsoft has now officially pulled the plug on this iconic crash screen.

Clash for Windows: Key Features and How to Use It Safely

The demand for web privacy and secure Internet access has sharply increased recently. As a result, many users are scrambling to find essential tools to guarantee online privacy and safety, such as Clash for Windows, one of the more popular tools. It comes with some powerful features that not only protect privacy but also improve the browsing experience. This post examines its main features and how it can be used safely.