<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="bbPress/1.2" -->
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>Giveaway of the Day Forums &#187; Topic: Windows June, 2025, Patch Tuesday (&amp; Wednesday)</title>
		<link>https://www.giveawayoftheday.com/forums/topic/474862</link>
		<description>Giveaway of the Day Forums &#187; Topic: Windows June, 2025, Patch Tuesday (&amp; Wednesday)</description>
		<language>en-US</language>
		<pubDate>Fri, 06 Mar 2026 08:35:24 +0000</pubDate>
		<generator>http://bbpress.org/?v=1.2</generator>
		<atom:link href="https://www.giveawayoftheday.com/forums/rss/topic/474862" rel="self" type="application/rss+xml" />

		<item>
			<title>Dragonlair on "Windows June, 2025, Patch Tuesday (&amp; Wednesday)"</title>
			<link>https://www.giveawayoftheday.com/forums/topic/474862#post-597004</link>
			<pubDate>Fri, 13 Jun 2025 02:14:08 +0000</pubDate>
			<dc:creator>Dragonlair</dc:creator>
			<guid isPermaLink="false">597004@https://www.giveawayoftheday.com/forums/</guid>
			<description><p>Actually, I hadn&#39;t noticed that it applied twice on my Win 11 Desktop.  It&#39;s downloading/installing now.  I&#39;ll reboot a bit later.</p>
<p>However, my Win 11 laptop got both updates yesterday!  I updated it, then checked since it is slow and doesn&#39;t always see everything and it was there again!  I let it do it and then finally got things settled so I could virus check it.</p>
<p>Just a little more delay.
</p></description>
		</item>
		<item>
			<title>mikiem2 on "Windows June, 2025, Patch Tuesday (&amp; Wednesday)"</title>
			<link>https://www.giveawayoftheday.com/forums/topic/474862#post-597003</link>
			<pubDate>Thu, 12 Jun 2025 18:09:34 +0000</pubDate>
			<dc:creator>mikiem2</dc:creator>
			<guid isPermaLink="false">597003@https://www.giveawayoftheday.com/forums/</guid>
			<description><p>bleepingcomputer[.]com/news/microsoft/microsoft-june-2025-patch-tuesday-fixes-exploited-zero-day-66-flaws/</p>
<p>bleepingcomputer[.]com/news/microsoft/windows-11-kb5060842-and-kb5060999-cumulative-updates-released/</p>
<p>bleepingcomputer[.]com/news/microsoft/windows-10-kb5060533-cumulative-update-released-with-7-changes-fixes/</p>
<p>support.microsoft[.]com/en-us/topic/june-11-2025-kb5063060-os-build-26100-4351-out-of-band-b1746442-8c6c-425d-ac5a-3a8f51e372f3</p>
<p>If you installed Tuesday&#39;s update for Win11 24H2, you got to do it all over again on Wednesday -- How Nice! There was a conflict with Tuesday&#39;s update &#38; Easy Anti-Cheat. Allegedly the update was blocked on systems with Easy Anti-Cheat installed, and also *allegedly* Wednesday&#39;s update only applied to those folks, which is Inaccurate/Wrong... Every copy of Win11 24H2 I updated Tuesday got Wednesday&#39;s update unasked for, and I am famously Not a gamer. </p>
<p>This month&#39;s updates patched a perhaps significant OOPs from Microsoft regarding Secure Boot, showing once again it isn&#39;t all that secure really. Binarly, a company that works with BIOS firmware, found a vulnerable Microsoft signed module that they found on Virus Total, so there&#39;s a good chance someone found &#38; uploaded it because it was being actively exploited. When Binarly reported it to Microsoft, they found 13 more Microsoft signed vulnerable modules -- all 14 were added to the revocation database with this patch. Per Binarly:</p>
<p><blockquote>&#34;... we effectively disable Secure Boot, allowing the execution of any unsigned UEFI modules.&#34;</p>
<p>Once disabled, attackers can install bootkit malware that can hide from the operating system and turn off further security features.&#34;</blockquote></p>
<p>bleepingcomputer[.]com/news/security/new-secure-boot-flaw-lets-attackers-install-bootkit-malware-patch-now/</p>
<p><blockquote>Microsoft&#39;s June 2025 Patch Tuesday, which includes security updates for 66 flaws, including one actively exploited vulnerability and another that was publicly disclosed.</p>
<p>This Patch Tuesday also fixes ten &#34;Critical&#34; vulnerabilities, eight being remote code execution vulnerabilities and two being elevation of privileges bugs.</p>
<p>The number of bugs in each vulnerability category is listed below:</p>
<p>    13 Elevation of Privilege Vulnerabilities<br />
    3 Security Feature Bypass Vulnerabilities<br />
    25 Remote Code Execution Vulnerabilities<br />
    17 Information Disclosure Vulnerabilities<br />
    6 Denial of Service Vulnerabilities<br />
    2 Spoofing Vulnerabilities<br />
</blockquote>
</p></description>
		</item>

	</channel>
</rss>
