Apple Releases Urgent iPhone and iPad Updates to Patch New Zero-Day Vulnerability – Tempemail

Apple on Monday released a security update for iOS and iPad to address a critical vulnerability that it says is being exploited in the wild, making it the 17th zero-day flaw the company has addressed in its products since the start of the year.’ The weakness, assigned the identifier CVE-2021-30883, Continue Reading

Urgent Chrome Update Released to Patch Actively Exploited Zero-Day Vulnerability – Tempemail

Google on Friday rolled out an emergency security patch to its Chrome web browser to address a security flaw that’s known to have an exploit in the wild. Tracked as CVE-2021-37973, the vulnerability has been described as use after free in Portals API, a web page navigation system that enables Continue Reading

VMware Warns of Critical File Upload Vulnerability Affecting vCenter Server – Tempemail

VMware on Tuesday published a new bulletin warning of as many as 19 vulnerabilities in vCenter Server and Cloud Foundation appliances that a remote attacker could exploit to take control of an affected system. The most urgent among them is an arbitrary file upload vulnerability in the Analytics service (CVE-2021-22005) Continue Reading

Unpatched High-Severity Vulnerability Affects Apple macOS Computers – Tempemail

Cybersecurity researchers on Tuesday disclosed details of an unpatched vulnerability in macOS Finder that could be abused by remote adversaries to trick users into running arbitrary commands on the machines. “A vulnerability in macOS Finder allows files whose extension is inetloc to execute arbitrary commands, these files can be embedded Continue Reading

Exploitation of the CVE-2021-40444 vulnerability in MSHTML- Tempemail

Summary Last week, Microsoft reported the remote code execution vulnerability CVE-2021-40444 in the MSHTML browser engine. According to the company, this vulnerability has already been used in targeted attacks against Microsoft Office users. In attempt to exploit this vulnerability, attackers create a document with a specially-crafted object. If a user Continue Reading

Microsoft Releases Patch for Actively Exploited Windows Zero-Day Vulnerability – Tempemail

A day after Apple and Google rolled out urgent security updates, Microsoft has pushed software fixes as part of its monthly Patch Tuesday release cycle to plug 66 security holes affecting Windows and other components such as Azure, Office, BitLocker, and Visual Studio, including an actively exploited zero-day in its Continue Reading

CISA Warns of Actively Exploited Zoho ManageEngine ADSelfService Vulnerability – Tempemail

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday issued a bulletin warning of a zero-day flaw affecting Zoho ManageEngine ADSelfService Plus deployments that is currently being actively exploited in the wild. The flaw, tracked as CVE-2021-40539, concerns a REST API authentication bypass that could lead to arbitrary remote Continue Reading

Microsoft Security Bulletin Warns of New Windows Print Spooler RCE Vulnerability – Tempemail

A day after releasing Patch Tuesday updates, Microsoft acknowledged yet another remote code execution vulnerability in the Windows Print Spooler component, adding that it’s working to remediate the issue in an upcoming security update. Tracked as CVE-2021-36958 (CVSS score: 7.3), the unpatched flaw is the latest to join a list Continue Reading

Microsoft Releases Windows Updates to Patch Actively Exploited Vulnerability – Tempemail

Microsoft on Tuesday rolled out security updates to address a total of 44 security issues affecting its software products and services, one of which it says is an actively exploited zero-day in the wild. The update, which is the smallest release since December 2019, squashes seven Critical and 37 Important Continue Reading

Vulnerability Assessment I A Complete Guide- Tempemail

Are you wondering about vulnerability assessments? We give a full explanation of what vulnerability assessments are, how they work, and how they help prevent cyberattacks. What Is Vulnerability Assessment? Vulnerability assessments systematically evaluate your system, looking for security weaknesses and vulnerabilities. The assessment provides information to the security team to Continue Reading