![]() |
Description: According to the tech giant, it has observed a threat group seeking out vulnerable customer accounts using generative AI, then creating tools to abuse these services.
January 13th, 2025 (3 months ago)
|
![]() |
January 13th, 2025 (3 months ago)
|
![]() |
Description: Apple recently addressed a macOS vulnerability that allows attackers to bypass System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions. [...]
January 13th, 2025 (3 months ago)
|
![]() |
Description: Microsoft is investigating an ongoing Multi-Factor Authentication (MFA) outage that is blocking customers from accessing Microsoft 365 Office apps. [...]
January 13th, 2025 (3 months ago)
|
![]() |
Description: Microsoft has revealed that it's pursuing legal action against a "foreign-based threat–actor group" for operating a hacking-as-a-service infrastructure to intentionally get around the safety controls of its generative artificial intelligence (AI) services and produce offensive and harmful content.
The tech giant's Digital Crimes Unit (DCU) said it has observed the threat actors "develop
January 11th, 2025 (3 months ago)
|
![]() |
Description: Microsoft will force install the new Outlook email client on Windows 10 systems starting with next month's security update. [...]
January 10th, 2025 (3 months ago)
|
![]() |
Description: Microsoft has fixed a known issue causing macOS applications to freeze when opening or saving files in OneDrive. [...]
January 9th, 2025 (3 months ago)
|
![]() |
Description: AI SPERA announced today that it launched its Criminal IP Malicious Link Detector add-in on the Microsoft Marketplace. Learn more about how this tool provides real-time phishing email detection and URL blocking for Microsoft Outlook. [...]
January 9th, 2025 (3 months ago)
|
![]() |
Description: Microsoft has fixed a known issue causing the classic Outlook email client to stop responding when copying text with the CTRL+C keyboard shortcut. [...]
January 9th, 2025 (3 months ago)
|
CVE-2024-55412 |
Description: A vulnerability exits in driver snxpsamd.sys in SUNIX Serial Driver x64 - 10.1.0.0, which allows low-privileged users to read and write arbitary i/o port via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
EPSS Score: 0.04%
January 9th, 2025 (3 months ago)
|