Patch Tuesday: Internet Explorer Vulnerabilities Patched

Patch Tuesday: Internet Explorer Vulnerabilities Patched

A breach in the engine behind Internet Explorer and a vulnerability in the Remote Desktop Protocol Service top the list of about 117 patches deployed in Microsoft’s monthly update. Around the same time, Apple has released a fix for macOS 15 that restores functionality to some third-party security tools. Patch Tuesday is a useful reminder for admins to ensure applications and security services are up to date. Microsoft Management Console vulnerability exploited Despite previous reports…

Read More

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Over 5,000 Fake Microsoft Notifications Fueling Email Compromise Campaigns

Check Point’s Harmony Email & Collaboration team detected over 5,000 emails disguised as Microsoft product notifications, which could lead to email extortion, the cybersecurity company said on Oct. 2. The emails stand out for their polished appearance and the inclusion of legitimate links. The announcement comes as part of Cybersecurity Awareness Month, highlighting the ongoing risks posed by phishing attacks. Email scam campaign stands out for polished appearance The emails come from “organizational domains impersonating…

Read More

Apple Joins Voluntary U.S. Government Commitment to AI Safety

Apple Joins Voluntary U.S. Government Commitment to AI Safety

Apple is the latest addition to the list of public U.S. companies that made voluntary commitments to AI regulations, the White House announced on July 26. The commitments, first announced in September 2023, include vows to publicly disclose AI capabilities, to watermark AI content and more. These commitments set a public standard for the country’s largest AI makers in an effort to reduce deception and other novel, unsafe practices that could stem from realistic-looking AI…

Read More

OpenAI Secrets Stolen in 2023 After Internal Forum Was Hacked

OpenAI Secrets Stolen in 2023 After Internal Forum Was Hacked

The online forum OpenAI employees use for confidential internal communications was breached last year, anonymous sources have told The New York Times. Hackers lifted details about the design of the company’s AI technologies from forum posts, but they did not infiltrate the systems where OpenAI actually houses and builds its AI. OpenAI executives announced the incident to the whole company during an all-hands meeting in April 2023, and also informed the board of directors. It…

Read More

Millions of Apple Applications Were Vulnerable to CocoaPods Attack

Millions of Apple Applications Were Vulnerable to CocoaPods Attack

Many macOS and iOS applications were open to a vulnerability in CocoaPods, an open-source dependency manager, E.V.A. Information Security revealed on July 1. The vulnerability has been patched since EVA first discovered it, and no attacks have occurred that are conclusively related to it. However, the case is interesting because the vulnerability stayed unnoticed for so long and highlighted how developers should be careful with open-source libraries. The vulnerability is a good reminder for developers…

Read More

Apple Operating Systems are Being Targeted by Threat Actors, Report Finds

Apple Operating Systems are Being Targeted by Threat Actors, Report Finds

The number of macOS vulnerabilities exploited in 2023 increased by more than 30%, according to a new report. The Software Vulnerability Ratings Report 2024 from patch management software company Action1 also found that Microsoft Office programs are becoming more exploitable, while attackers are targeting load balancers like NGINX and Citrix at a record rate. Action1 analysts used data from the National Vulnerability Database and CVEdetails.com to draw five insights into how the threat landscape changed…

Read More

Microsoft Delays Recall Launch, Seeking Community Feedback First

Microsoft Delays Recall Launch, Seeking Community Feedback First

Microsoft’s Recall feature, the AI-enabled timeline for Windows 11 on Copilot+ PCs, will be available only to members of the Windows Insider Program in June, instead of the initial planned public preview slated for June 18. This change follows Microsoft’s decision last week to make Recall opt-in instead of enabled by default. Other users will have access to Recall “soon,” after the Redmond giant has had time to respond to feedback from the Windows Insider…

Read More

Apple iOS 18 Cheat Sheet: Release Date, RCS Integration and More

Apple iOS 18 Cheat Sheet: Release Date, RCS Integration and More

Apple’s latest version of its mobile operating system, iOS 18, was unveiled during WWDC ‘24 on June 10, 2024, and features many niceties that users have been wanting for years. From AI integration with Siri and throughout the system to a standalone Passwords app, to being able to send messages via satellite when your iPhone doesn’t have service, there’s a feature that will likely appeal to someone. Whether you’re using an iPhone or an iPad,…

Read More

Apple Alerts iPhone Users to Mercenary Spyware Attacks

Apple Alerts iPhone Users to Mercenary Spyware Attacks

Apple sent a threat notification to iPhone users in 92 countries on April 10 informing them that their device was “being targeted by a mercenary spyware attack.” The alert, sent at 12:00 p.m. Pacific Time, told recipients that the attackers were attempting to “remotely compromise” their phone and that they were likely being targeted specifically “because of who you are or what you do.” Apple’s notification did not identify the alleged attackers, nor did it…

Read More

New GoFetch Vulnerability in Apple's M Chips Allows Secret Keys Leak on Compromised Computers

New GoFetch Vulnerability in Apple's M Chips Allows Secret Keys Leak on Compromised Computers

The newly exposed GoFetch vulnerability affecting Apple’s M1, M2 and M3 chips lets an attacker exfiltrate secret keys from cryptographic applications on a targeted system. The exploit works by running a fraudulent process on the same CPU cluster as the targeted process on the targeted machine. No easy mitigation currently exists for this vulnerability, as it resides in the hardware. What is the GoFetch vulnerability? GoFetch is a cache side-channel vulnerability. This type of vulnerability…

Read More
1 2 3