Researchers detail unauthenticated bypass via Apple USB vulnerability – Go Health Pro

Researchers detail unauthenticated bypass via Apple USB vulnerability – Go Health Pro

Security researchers provided a deep-dive into a high-profile vulnerability in Apple’s iOS.Designated CVE-2025-24200, the vulnerability is classified as an authentication bypass flaw related to the way iOS devices interact with USB connections. The flaw was made public with the release of iOS 18.3.1, which resolves the issue.Credit for discovery of the vulnerability was given to … Read more

Microsoft fixes CVSS 9.9 vulnerability in Azure AI Face service – Go Health Pro

Microsoft fixes CVSS 9.9 vulnerability in Azure AI Face service – Go Health Pro

Microsoft has fixed a critical vulnerability in its Azure AI Face service deemed worthy of a CVSS score of 9.9 potentially leading to elevation of privileges over a network. Azure AI Face is a cloud-based facial recognition service that is capable of detecting, analyzing and recognizing human faces. The service can be used by developers … Read more

Ivanti Zero-Day Vulnerability Exploited: The Details – Go Health Pro

Ivanti Zero-Day Vulnerability Exploited: The Details – Go Health Pro

The UK’s National Cyber Security Centre (NCSC) and its US counterpart have issued an urgent advisory to Ivanti customers after discovering two critical vulnerabilities, one of which is actively exploited. Read on to see how the Ivanti Zero-Day Vulnerability was exploited. Details of how the Ivanti Zero-Day Vulnerability was exploited Ivanti released a security advisory … Read more

Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation – Go Health Pro

Microsoft Uncovers macOS Vulnerability CVE-2024-44243 Allowing Rootkit Installation – Go Health Pro

Jan 14, 2025Ravie LakshmananEndpoint Security / Vulnerability Microsoft has shed light on a now-patched security flaw impacting Apple macOS that, if successfully exploited, could have allowed an attacker running as “root” to bypass the operating system’s System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions. The vulnerability in question is … Read more

Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners – Go Health Pro

Hackers Exploit Aviatrix Controller Vulnerability to Deploy Backdoors and Crypto Miners – Go Health Pro

Jan 13, 2025Ravie LakshmananVulnerability / Cloud Security A recently disclosed critical security flaw impacting the Aviatrix Controller cloud networking platform has come under active exploitation in the wild to deploy backdoors and cryptocurrency miners. Cloud security firm Wiz said it’s currently responding to “multiple incidents” involving the weaponization of CVE-2024-50603 (CVSS score: 10.0), a maximum … Read more

x