Security
Headlines
HeadlinesLatestCVEs

Tag

#microsoft

How to Protect Your Environment From the NTLM Vulnerability

This Tech Tip outlines what enterprise defenders need to do to protect their enterprise environment from the new NTLM vulnerability.

DARKReading
#vulnerability#web#ios#windows#microsoft#git#ldap#samba#auth#zero_day
Managing Threats When Most of the Security Team Is Out of the Office

During holidays and slow weeks, teams thin out and attackers move in. Here are strategies to bridge gaps, stay vigilant, and keep systems secure during those lulls.

‘Fix It’ social-engineering scheme impersonates several brands

Criminals are luring victims looking to download software and tricking them into running a malicious command.

CVE-2024-12695: Chromium: CVE-2024-12695 Out of bounds write in V8

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 131.0.2903.112 12/19/2024 131.0.6778.205

CVE-2024-12694: Chromium: CVE-2024-12694 Use after free in Compositing

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 131.0.2903.112 12/19/2024 131.0.6778.205

CVE-2024-12693: Chromium: CVE-2024-12693 Out of bounds memory access in V8

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 131.0.2903.112 12/19/2024 131.0.6778.205

CVE-2024-12692: Chromium: CVE-2024-12692 Type Confusion in V8

**What is the version information for this release?** Microsoft Edge Version Date Released Based on Chromium Version 131.0.2903.112 12/19/2024 131.0.6778.205

Welcome to the party, pal!

In the last newsletter of the year, Thorsten recalls his tech-savvy gift to his family and how we can all incorporate cybersecurity protections this holiday season.

Vendors Chase Potential of Non-Human Identity Management

Non-human identities authenticate machine-to-machine communication. The big challenge now is to secure their elements and processes — before attackers can intercept.

Malvertisers Fool Google With AI-Generated Decoy Content

Seemingly innocent "white pages," including an elaborate Star Wars-themed site, are bypassing Google's malvertising filters, showing up high in search results to lure users to second-stage phishing sites.