APPLE-SA-2023-01-23-4 macOS Ventura 13.2
Posted by Apple Product Security via Fulldisclosure on Jan 23 APPLE-SA-2023-01-23-4 macOS Ventura 13.2 macOS Ventura 13.2 addresses the following issues. Information about the security...
APPLE-SA-2023-01-23-3 iOS 12.5.7
Posted by Apple Product Security via Fulldisclosure on Jan 23 APPLE-SA-2023-01-23-3 iOS 12.5.7 iOS 12.5.7 addresses the following issues. Information about the security content is...
APPLE-SA-2023-01-23-2 iOS 15.7.3 and iPadOS 15.7.3
Posted by Apple Product Security via Fulldisclosure on Jan 23 APPLE-SA-2023-01-23-2 iOS 15.7.3 and iPadOS 15.7.3 iOS 15.7.3 and iPadOS 15.7.3 addresses the following issues....
APPLE-SA-2023-01-23-1 iOS 16.3 and iPadOS 16.3
Posted by Apple Product Security via Fulldisclosure on Jan 23 APPLE-SA-2023-01-23-1 iOS 16.3 and iPadOS 16.3 iOS 16.3 and iPadOS 16.3 addresses the following issues....
Australia fronts International Counter Ransomware Taskforce
The International Counter Ransomware Taskforce (ICRTF), envisioned by the International Counter Ransomware Initiative (CRI), kicked off its operations on Monday with Australia as its inaugural chair...
What Should You Do if Your Identity Has Been Stolen?
It’s been like this from the start—wherever people shop, do business, or simply gather together, you’ll find thieves in the mix, ready to take advantage....
USN-5820-1: exuberant-ctags vulnerability
Lorenz Hipp discovered a flaw in exuberant-ctags handling of the tag filename command-line argument. A crafted tag filename specified in the command line or in...
The PayPal Breach – Who Was Affected and How You Can Protect Yourself
PayPal recently notified thousands of its customers that their accounts were breached by hackers, leaving their Social Security Numbers and other key pieces of personal...
DSA-5325 spip – security update
It was discovered that SPIP, a website engine for publishing, would allow a malicious user to SQL injection attacks, or bypass authorization access. Read More
DSA-5326 nodejs – security update
Multiple vulnerabilities were discovered in Node.js, which could result in HTTP request smuggling, bypass of host IP address validation and weak randomness setup. Read More