Quick Machine Recovery

How Windows 11 Quick Machine Recovery works

A new Windows 11 feature called Quick Machine Recovery is designed to restore PCs quickly after boot failures. On a failed boot, QMR initiates a step-by-step process that diagnoses the issue, connects to Windows Update, searches for solutions and applies fixes. In test scenarios, the process took under four minutes. QMR is still rolling out and works best on newer devices, but it aims to dramatically reduce recovery time for users and businesses alike.

Full Story: Computerworld (8/7) 

Threat Detection

Dual Role of AI: Protection and Threat Detection

AI is transforming IT, #cybersecurity, and tech through intelligent threat detection, proactive cloud security, and risk management. It’s a catalyst for innovation and data-driven decisions, but also poses threats. Explore AI’s dual role as protector and threat at our event, and stay competitive in the evolving AI field.
Register now!

The Matrix now Activated.

Disable Excel workbook links 

Microsoft to disable Excel workbook links to blocked file types

Microsoft has announced that it will start disabling external workbook links to blocked file types by default between October 2025 and July 2026.

After the rollout, Excel workbooks referencing blocked file types will display a #BLOCKED error or fail to refresh, eliminating security risks associated with accessing unsupported or high-risk file types, including, but not limited to, phishing attacks that utilize workbooks to redirect targets to malicious payloads.

This change is being introduced as a new FileBlockExternalLinks group policy, which expands File Block Settings to include external workbook links.

Read the full article: Microsoft to disable Excel workbook links to blocked file types

Outlook Recall Message

Recall or replace a sent email in Outlook

Try it!

If you’re using the Microsoft Outlook app or Outlook.com, and if you and your recipients are all on Microsoft Exchange or Microsoft 365 and in the same organization, you can recall or replace an email message that you sent.

Important: If your account is a MAPI or POP account, recall won’t work.

  1. Select the Sent Items folder.
  2. Select or double-click the message so it opens in another window.
  3. Select File > Info.
  4. Select Resend or Recall and select one of the two options.
    1. Select Recall This Message… to delete or replace a sent message.
    2. Select Resend This Message… to send a message again with the option to update content or change recipients.
  5. Select the Tell me if recall succeeds or fails for each recipient check box.
  6. Select OK. Note: If you selected Delete unread copies and replace with a new message, the original message opens for editing. When you select Send, the original email message will be deleted from the recipient’s mailbox and replaced with the newly edited one.

Watch the short Video

IT Support

Tech support specialists’ vital role in IT operations

Tech support is typically seen as the least desirable of IT roles due to lower pay and challenging interactions with users, but it’s an attractive option since it typically requires minimal education and experience, making it accessible. Tech support also provides opportunities for remote work, dynamic tasks and stable employment, and the experience in the field can lead to higher-paying IT positions.

Full Story: ITPro Today (7/21) 

Patch Tuesday

Microsoft’s Patch Tuesday rolls out 130 fixes

Microsoft has addressed 130 vulnerabilities in its latest Patch Tuesday update, including a critical remote code execution flaw in SPNEGO Extended Negotiation and an information disclosure issue in SQL Server. The update also resolves issues in BitLocker and Windows Hyper-V.

Full Story: The Hacker News (India) (7/9) 

DNS Records

Microsoft corrects DNS records, tests OTP email issue fix

Microsoft is addressing a DNS misconfiguration that has disrupted the delivery of one-time passcodes for Exchange Online users. The issue, deemed a critical service problem, affects users receiving encrypted emails via Gmail and Yahoo. Microsoft has corrected the DNS records and is testing the solution with affected users.

Full Story: BleepingComputer (7/2) 

Authenticator

Microsoft to rid Authenticator of password management

Microsoft will end support for password management in its Authenticator app at the end of July as part of a broader move toward passwordless authentication methods such as passkeys and FIDO2. Microsoft suggests users who continue to use passwords to use dedicated password managers such as Microsoft Edge or Google Password Manager.

Full Story: The Hacker News (India) (7/1) 

SolarWinds Backdoor

What They’re Not Telling You About SolarWinds: It Wasn’t a Breach — It Was the Backdoor

In December 2020, the world was told a Russian “Hack” hit U.S. federal networks through SolarWinds.

Wrong.

It wasn’t a foreign op.

It was a white hat takeover of the digital command grid.

Let me show you.

1. What Was SolarWinds?

A Texas-based IT company that pushed software updates to:

  • Pentagon
  • DHS
  • State Department
  • Treasury
  • NSA
  • Big Tech (Microsoft, Cisco)
  • Even Dominion Voting Systems
  • The update included a hidden “Sunburst” backdoor.

What they called a vulnerability…

…was actually a legal foothold.

2. EO 13848 Was Already Active

Trump had already signed Executive Order 13848 in 2018:

Declaring election interference a national emergency.

By 2020, SolarWinds gave federal intel teams lawful access to:

  • Servers
  • Email traffic
  • Internal communications
  • Contract records
  • Voting infrastructure

Under 13848, they didn’t need permission.

They needed access.

SolarWinds was access.

3. What Came Next?

  1. 2021: Microsoft, FireEye, and CISA all “confirm breach”
  2. 2021–2022: Mass resignations in Big Tech, banking, and military
  3. 2022–2023: SCOTUS shadow docket rulings + Roe overturned
  4. 2023–2024: NGO purges, media collapses, asset seizures escalate
  5. 2025: One Big Beautiful Bill → AI firewall codified

You’re watching a multi-year digital sting operation unfold in quarters.

4. SolarWinds + EO 13961 = Continuity Killbox

EO 13961 (Mission Continuity Strategy, Dec 2020):

Federalizes critical mission systems across all agencies.

Now link the pieces:

  • SolarWinds → digital access
  • EO 13848 → legal seizure authority
  • EO 13961 → control continuity
  • 2025 AI Clause → shields enforcement from state interference

This isn’t cleanup. It’s activation.

5. The Real Operation

SolarWinds wasn’t a failure.

It was the launchpad for:

  1. Asset tracing
  2. Intel extraction
  3. Sting AI deployment
  4. Legal lockdown of Deep State infrastructure

Total ops handoff to Continuity teams (Guard/Marines/Coast Guard)

The Great Reset isn’t theirs.

It’s ours.

Bottom Line:

  • SolarWinds was the moment they got the keys.
  • Every laptop seized…
  • Every NGO collapsed…
  • Every offshore trust exposed…
  • It all ties back to December 2020.
  • And now in July 2025, they’ve made it permanent.