Cisco, Microsoft Disagree on Severity of macOS App Vulnerabilities 

Multiple vulnerabilities in Microsoft applications for macOS could be exploited to send emails, leak sensitive information, and escalate privileges.
The post Cisco, Microsoft Disagree on Severity of macOS App Vulnerabilities  appeared first on Security… Continue reading Cisco, Microsoft Disagree on Severity of macOS App Vulnerabilities 

How Exceptional CISOs Are Igniting the Security Fire in Their Development Team

For years, many CISOs have struggled to influence their development cohort on the importance of putting security first.
The post How Exceptional CISOs Are Igniting the Security Fire in Their Development Team appeared first on SecurityWeek.
Continue reading How Exceptional CISOs Are Igniting the Security Fire in Their Development Team

New Windows IPv6 Zero-Click Vulnerability

The press is reporting a critical Windows vulnerability affecting IPv6.

As Microsoft explained in its Tuesday advisory, unauthenticated attackers can exploit the flaw remotely in low-complexity attacks by repeatedly sending IPv6 packets that include specially crafted packets.

Microsoft also shared its exploitability assessment for this critical vulnerability, tagging it with an “exploitation more likely” label, which means that threat actors could create exploit code to “consistently exploit the flaw in attacks.”

Details are being withheld at the moment. Microsoft strongly recommends …

Continue reading New Windows IPv6 Zero-Click Vulnerability

Zero-Click Exploit Concerns Drive Urgent Patching of Windows TCP/IP Flaw

Security experts are ratcheting up the urgency for Windows admins to patch a wormable, pre-auth remote code execution vulnerability in the Windows TCP/IP stack.
The post Zero-Click Exploit Concerns Drive Urgent Patching of Windows TCP/IP Flaw appeared … Continue reading Zero-Click Exploit Concerns Drive Urgent Patching of Windows TCP/IP Flaw

GitHub Actions Artifacts Leak Tokens and Expose Cloud Services and Repositories

Misconfigurations and security bugs lead to GitHub Actions artifacts exposing tokens for third party cloud services and GitHub repositories.
The post GitHub Actions Artifacts Leak Tokens and Expose Cloud Services and Repositories appeared first on Secu… Continue reading GitHub Actions Artifacts Leak Tokens and Expose Cloud Services and Repositories

Zero trust: How the ‘Jia Tan’ hack complicated open-source software

The volunteers that maintain open-source software have always been knocked around by the tech community. The Jia Tan hack made it all so much worse.

The post Zero trust: How the ‘Jia Tan’ hack complicated open-source software appeared first on CyberScoop.

Continue reading Zero trust: How the ‘Jia Tan’ hack complicated open-source software