Security
Headlines
HeadlinesLatestCVEs

Tag

#microsoft

Backdoor.Win32.Hupigon.afjk Authentication Bypass / Code Execution

Backdoor.Win32.Hupigon.afjk malware suffers from bypass and code execution vulnerabilities.

Packet Storm
#web#red_hat#ubuntu#web#vulnerability#vulnerability#microsoft#vulnerability#apple#dos#vulnerability#apple#dos#vulnerability#vulnerability#vulnerability#ios#apple#dos#vulnerability#apple#vulnerability#vulnerability#vulnerability#vulnerability
Apple Security Advisory 2021-10-26-7

Apple Security Advisory 2021-10-26-7 - tvOS 15.1 addresses buffer overflow, code execution, cross site scripting, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

Apple Security Advisory 2021-10-26-6

Apple Security Advisory 2021-10-26-6 - watchOS 8.1 addresses buffer overflow, code execution, cross site scripting, information leakage, integer overflow, out of bounds read, out of bounds write, and use-after-free vulnerabilities.

A Guide to Shift Away from Legacy Authentication Protocols in Microsoft 365

Microsoft 365 (M365), formerly called Office 365 (O365), is Microsoft's cloud strategy flagship product with major changes ahead, such as the deprecation of their legacy authentication protocols. Often stored on or saved to the device, Basic Authentication protocols rely on sending usernames and passwords with every request, increasing the risk of attackers capturing users' credentials,