8 Security Flaws Discovered in macOS Operating System for Microsoft Applications

8 Security Flaws Discovered in macOS Operating System for Microsoft Applications

8 vulnerabilities have been discovered in macOS operating system Microsoft apps by researchers from Cisco Talos. These vulnerabilities allow a malicious actor to bypass the permission model of the OS using existing permissions without further user verification. Exploiting these vulnerabilities could give an attacker privileges within the targeted application, such as sending emails, recording video […]

Cyber criminals focus their attacks on the manufacturing sector

Critical Start has recently published its biannual Cyber Threat Intelligence Report, highlighting the top threat trends witnessed in the first half of 2024. This encompasses emerging cybersecurity threats affecting industries like manufacturing, technology, healthcare, engineering and construction, and professional services. Noteworthy discoveries from the report include: Manufacturing emerges as the primary target industry for malicious […]

National Security Experts Address Public Data Breach

National Public Data, a background checking organization, experienced a breach potentially affecting 2.9 billion individuals. The breach exposed personally identifiable information (PII) such as names, phone numbers, mailing addresses, email addresses, and Social Security numbers.  “Organizations rely on the exchange of data for their vitality,” says Clyde Williamson, Product Management, Innovations at Protegrity. “Consumers share […]

Recent Study Reveals: Cybercriminals are Mimicking Tech Corporations

New research from Cado Security reveals that malicious actors are imitating tech companies in an effort to compromise corporate systems. Researchers discovered a typosquatting threat, in which malicious actors register domains that closely mimic an already existing domain. This is often done by replacing symbols with other, similar looking ones, such as swapping the letter […]

Microsoft Entra ID vulnerability allows for authentication bypass

Recent studies have revealed that Microsoft Entra ID (formerly Azure AD), a cloud-based identity and access management solution, can be exploited to bypass security protocols. Cybercriminals have found ways to manipulate the credential validation process, turning the pass-through authentication (PTA) agent into a tool that enables unauthorized access as any AD user. This opens up […]

Security experts discuss the implications of the Trump campaign hack

The Trump campaign experienced a hack that compromised some internal communications. Steven Cheung, a spokesperson for the Trump campaign, stated, “These documents were illegally obtained from foreign sources hostile to the United States, with the intention of interfering in the 2024 election and causing chaos in our democratic process. A new report from Microsoft revealed […]

Why is Post-Quantum Cryptography so Important?

If you follow IT and cybersecurity news, you’ll be familiar with mentions of quantum computing, usually followed by something about post-quantum cryptography. In fact, just recently, NIST announced the formal approval of the first set of PQC standards, which will doubtless fuel more quantum apocalypse predictions in the news. Let’s take a very high-level look […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

TSP
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.