Security
Headlines
HeadlinesLatestCVEs

Tag

#microsoft

Apple Security Advisory 2021-10-26-7

Apple Security Advisory 2021-10-26-7 - tvOS 15.1 addresses buffer overflow, code execution, cross site scripting, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

Packet Storm
#web#red_hat#ubuntu#web#vulnerability#vulnerability#microsoft#vulnerability#apple#dos#vulnerability#apple#dos#vulnerability#vulnerability#vulnerability#ios#apple#dos#vulnerability#apple#vulnerability#vulnerability#vulnerability#vulnerability#vulnerability#apple
Apple Security Advisory 2021-10-26-6

Apple Security Advisory 2021-10-26-6 - watchOS 8.1 addresses buffer overflow, code execution, cross site scripting, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

A Guide to Shift Away from Legacy Authentication Protocols in Microsoft 365

Microsoft 365 (M365), formerly called Office 365 (O365), is Microsoft's cloud strategy flagship product with major changes ahead, such as the deprecation of their legacy authentication protocols. Often stored on or saved to the device, Basic Authentication protocols rely on sending usernames and passwords with every request, increasing the risk of attackers capturing users' credentials,

Microsoft Warns of Continued Supply-Chain Attacks by the Nobelium Hacker Group

Nobelium, the threat actor behind the SolarWinds compromise in December 2020, has been behind an ongoing wave of attacks that compromised 14 downstream customers of multiple cloud service providers (CSP), managed service providers (MSP), and other IT services organizations, illustrating the adversary's continuing interest in targeting the supply chain via the "compromise-one-to-compromise-many"