by Fortify Security Team | Jan 27, 2022 | Security Advisories
Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch. iPadOS is the successor to iOS 12 and...
by Fortify Security Team | Jan 12, 2022 | Security Advisories
Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for Arbitrary Code Execution. Acrobat and Reader is a family of application software and Web services mainly used to create, view, and edit PDF documents. Illustrator...
by Fortify Security Team | Aug 8, 2021 | Industry News
Title: Black Hat: Security Bugs Allow Takeover of Capsule Hotel Rooms Date Published: August 4, 2021 Black Hat: Security Bugs Allow Takeover of Capsule Hotel Rooms Excerpt: “He connected his laptop to the vulnerable AP using the credentials in order to set up a...
by Fortify Security Team | Jul 27, 2021 | Security Advisories
A vulnerability has been discovered in macOS Big Sur, iOS and iPadOS, which could allow for arbitrary code execution. iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch. iPadOS is the successor to iOS 12 and is a mobile...
by Fortify Security Team | Jul 8, 2021 | Industry News
Title: Morgan Stanley Reports Data Breach After Vendor Accellion Hack Date Published: July 8, 2021 https://www.bleepingcomputer.com/news/security/morgan-stanley-reports-data-breach-after-vendor-accellion-hack/ Excerpt: “Investment banking firm Morgan Stanley has...