Wednesday, December 3, 2025
Update ADFS certificate after Microsoft deprecation of Azure AD and MSOnline PowerShell (Connect-MsolService) and retirement is on July 1, 2025.
A website help you to search for Known Exploited Vulnerabilities (KEV)
A website help you to search for Known Exploited Vulnerabilities (KEV)
Wednesday, November 5, 2025
How to bypass proxy for Microsoft Update via Pac file
How to bypass proxy for Microsoft Update via Pac file
Windows 11 24H2 (OS Build 26100.6901) Wifi issue on Lenovo T14s
Windows 11 24H2 (OS Build 26100.6901) Wifi issue on Lenovo T14s
Monday, October 27, 2025
Windows 10 using HardeningKitty to harden it
When you click Windows update on Windows 10 you will receive the following message:
As a short term solution for end of support Windows 10, using HardeningKitty to harden it will reduce the risk.
Reference:
https://www.youtube.com/watch?v=SoceWcFh4z0
Windows 10 using HardeningKitty to harden it
Windows 10 end of support - Some option for home users who cannot upgrade to Windows 11
After Windows 10 reached its end of support on October 14, 2025, millions of older PCs that cannot upgrade to Windows 11 have become vulnerable unless users take prompt action. Below is a structured summary addressing the three areas you requested: support status, security risks, and user recommendations.
Windows 10 end of support - Some option for home users who cannot upgrade to Windows 11
Saturday, September 27, 2025
Cisco ASA (CVE-2025-20333) (CVSS: 9.9) (CVE-2025-20362) (CVSS: 6.5)
Patch asap.
https://software.cisco.com/download/home/286285782/type/280775065/release/9.16.4%20Interim
Cisco Security Advisory: Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firewall
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote a
https://x.com/TheHackersNews/status/1971278285138268395?t=zA5NXTNfTvuWF557wLLXGw&s
Cisco ASA fixed version 9.16.4.85, 9.17.1.45, 9.18.4.47, 9.19.1.37, 9.20.3.7, 9.22.1.3
CVE-2025-20333
https://www.tenable.com/blog/cve-2025-20333-cve-2025-20362-faq-cisco-asa-ftd-zero-days-uat4356
CVE-2025-20333, CVE-2025-20362: Cisco Zero-Days Exploited | Tenable®
Cisco patched two zero-days in ASA and FTD, CVE-2025-20333, CVE-2025-20362, that were exploited by the same threat actor behind the ArcaneDoor campaign, UAT4356
Cisco Security Advisory: Cisco Secure Firewall Adaptive Security Appliance Software and Secure Firew
A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote a
https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks
Cisco Event Response: Continued Attacks Against Cisco Firewalls
Home / Cisco Security Cisco Event Response: Continued Attacks Against Cisco Firewalls Version 1: September 25, 2025 Summary In May 2025, Cisco was engaged by multiple government agencies that provide
https://thecyberexpress.com/cisa-warns-of-cve-2025-20333/
CISA Warns Of CVE-2025-20333 In Cisco ASA Devices
CISA issues Directive 25-03 to address CVE-2025-20333 and related Cisco ASA threats, urging agencies to patch systems and mitigate active exploitation.
Bugs Targets Firewalls, IOS
Patch now: Cisco recently disclosed four zero-days, including three targeted by a nation-state actor previously behind the "ArcaneDoor" campaign.
Cisco ASA (CVE-2025-20333) (CVSS: 9.9) (CVE-2025-20362) (CVSS: 6.5)
Open Source Firewall
Open Source Firewall
Sunday, September 21, 2025
美国(CVE)中国(CNVD / CNNVD / CICSVD)欧洲(EUVD)
| 特性 | 美国(CVE) |
| 核心组织 | MITRE Corporation(管理) |
| | |
| | |
| 英文名称 | Common Vulnerabilities and Exposures |
| | |
| | |
| 成立时间 | 1999年 |
| | |
| | |
| 主要功能 | 唯一标识已知安全漏洞(标准化编号) |
| 覆盖范围 | 全球,面向所有ICT产品与服务 |
| 重点产品/领域 | 所有类型软硬件产品(通用) |
| 编号机制 | 使用独立CVE编号(CVE-YYYY-XXXXX) |
| 与CVE关系 | 核心标准 |
| 运营模式 | 非营利、公开协作(MITRE主导) |
| 特色/优势 | 全球通用标准,被广泛引用 |
| 特性 | 中国(CNVD / CNNVD / CICSVD) |
| 核心组织 | CNVD:CNCERT(国家互联网应急中心) |
| | CNNVD:CNITSEC(中国信息安全测评中心) |
| | CICSVD:CICS-CERT(国家工信安全中心) |
| 英文名称 | China National Vulnerability Database |
| | China National Vulnerability Database (CNNVD) |
| | China Industrial Control System Vulnerability Database (CICSVD) |
| 成立时间 | CNVD:2004年 |
| | CNNVD:2007年 |
| | CICSVD:2018年 |
| 主要功能 | 漏洞收集、通报、预警、技术支持与应急响应 |
| 覆盖范围 | 中国境内或由中国机构运营的系统与产品为主 |
| 重点产品/领域 | 通用IT系统、政府/关键基础设施、工业控制系统(CICSVD) |
| 编号机制 | 使用CNVD编号(如CNVD-2025-XXXXX)或CNNVD编号(如CNNVD-2025-XXXXX) |
| 与CVE关系 | 部分漏洞同步至CVE,但独立管理 |
| 运营模式 | 政府主导,国家级应急响应机制 |
| 特色/优势 | 本土响应迅速,政策联动强,覆盖工业控制 |
| 特性 | 欧洲(EUVD) |
| 核心组织 | ENISA(欧洲网络安全局) |
| | |
| | |
| 英文名称 | European Union Vulnerability Database (EUVD) |
| | |
| | |
| 成立时间 | 2025年4月(正式发布) |
| | |
| | |
| 主要功能 | 聚合、验证并发布欧盟范围内的网络安全漏洞信息 |
| 覆盖范围 | 欧盟境内ICT产品与服务,聚焦欧盟数字生态 |
| 重点产品/领域 | IT产品、网络设备、云服务、关键基础设施、欧盟相关供应链 |
| 编号机制 | 使用EUVD自有ID(如EUVD-2025-XXXXX),仍保留CVE作为"替代ID" |
| 与CVE关系 | 与CVE并行,引用CVE但不依赖其编号体系 |
| 运营模式 | 欧盟机构主导,公共平台,强调数字韧性与互操作性 |
| 特色/优势 | 强调漏洞利用状态分析、缓解措施建议,支持风险评估与事件响应 |
美国(CVE)中国(CNVD / CNNVD / CICSVD)欧洲(EUVD)