Hey Windows (ab)users: It's Patch Tuesday again! Patch 'em if you got 'em.
https://krebsonsecurity.com/2025/12/microsoft-patch-tuesday-december-2025-edition/
Hey Windows (ab)users: It's Patch Tuesday again! Patch 'em if you got 'em.
https://krebsonsecurity.com/2025/12/microsoft-patch-tuesday-december-2025-edition/
Hey Windows (ab)users: It's Patch Tuesday again! Patch 'em if you got 'em.
https://krebsonsecurity.com/2025/12/microsoft-patch-tuesday-december-2025-edition/
After #CyberMonday comes #PatchTuesday, naturally.
—> https://stickerthepla.net/#018 <—
Dark times call for glow-in-the-dark #SafetyThird patches with velcro backing. Incredible deals when you bundle up several: THREE for $29, or TEN for $69 USD.
Order today for bonus gifts for your sleigh. MOAR stocking-stuffers: https://stickerthepla.net
#PatchAllTheThings
#EPluribusStickerum
After #CyberMonday comes #PatchTuesday, naturally.
—> https://stickerthepla.net/#018 <—
Dark times call for glow-in-the-dark #SafetyThird patches with velcro backing. Incredible deals when you bundle up several: THREE for $29, or TEN for $69 USD.
Order today for bonus gifts for your sleigh. MOAR stocking-stuffers: https://stickerthepla.net
#PatchAllTheThings
#EPluribusStickerum
I definitely recommend folks read the paper linked in the first post. Here's a TL;DR summary in the form of Figure 1: " "A hypothetical graph of risks of loss from penetration and from application of a bad patch. The optimal time to apply a patch is where the risk lines cross."
Folks who like that paper may light this one as well.
It studies Microsoft "Patch Tuesday" updates in particular, which are much different (in my opinion) than your typical open source software updates that are labeled with a CVE.