Author Archives: [email protected]

Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation

Microsoft has shed light on a now-patched security flaw impacting Apple macOS that, if successfully exploited, could have allowed an attacker running as “root” to bypass the operating system’s System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions. The vulnerability in question is CVE-2024-44243 (CVSS score: 5.5), a medium-severity bug

Google OAuth Vulnerability Exposes Millions via Failed Startup Domains

New research has pulled back the curtain on a “deficiency” in Google’s “Sign in with Google” authentication flow that exploits a quirk in domain ownership to gain access to sensitive data. “Google’s OAuth login doesn’t protect against someone purchasing a failed startup’s domain and using it to re-create email accounts for former employees,” Truffle Security […]

Pearson and Microsoft announce multiyear partnership to transform the future of learning and work with AI

Both companies are committing to transforming and scaling AI skilling and learning for learners, workers and employers Pearson to further benefit from Microsoft Azure Cloud capabilities and AI tools, including rolling out Microsoft 365 Copilot across its workforce Microsoft to further benefit from Pearson assessment and learning services LONDON and REDMOND, Wash. — Jan. 14, […]

Secrets & Non-Human Identity Security in Hybrid Cloud Infrastructure: Strategies for Success

Written by Itzik Alvas, Entro.Secrets & Non-Human Identities (NHIs) security in hybrid cloud environments is a critical challenge in today’s IT landscape. Passwords, API keys, certificates, and tokens are not just digital assets; they are the lifeblood of your organization’s security. Protecting these non-human identities is essential for maintaining the integrity of your infrastructure. This […]