Web browser: critical security gap in Chrome sealed

Web browser: critical security gap in Chrome sealed

The Chrome web browser has been released in an updated version – and thus closes a security gap as critically sorted. Chrome users should ensure that the current version runs with you. In one Correcting the version of the version of Google’s developer The weaknesses are very scarce, which closes the new version. “Heap-based buffer … Read more

Endpoint Security: Apple secures TCC framework better

Endpoint Security: Apple secures TCC framework better

Apple has submitted an important security function with the update to MacOS 15.4, which was released on Monday, the administrators should be interested in: In the future, so-called TCC events can also be recorded by endpoint security tools. The latter are used in particular in companies to prevent users from installing, installing malware or building … Read more

Security update: Ghostscript attackable via several security gaps

Security update: Ghostscript attackable via several security gaps

Ghostscript is vulnerable to several security gaps. Further information on the weak points is still pending. A security patch is available. There are currently no reports on attacks. Security problems As can be seen from the changelog to the current Ghostscript version 10.05.0the developers have a total of nine weak points: CVE 2025-27835, CVE 2025-27832, … Read more

Update now! Zero-day security gap in Chrome is attacked

Update now! Zero-day security gap in Chrome is attacked

Google published an update for the Chrome web browser on Wednesday night. She stuffs a zero-day security leak that attackers already abuse in the wild. If you use Chrome, you should quickly check whether the error corrected version is already installed and active. In the Writing the version of the version of Google's developerthat under … Read more

Two-part webinar: Security & Compliance for Apple devices in companies

Two-part webinar: Security & Compliance for Apple devices in companies

In this two-part webinar series Learn how to successfully implement the security and compliance requirements for Apple devices in your company. Our experts deal with topics such as the implementation of security guidelines, compliance with data protection regulations, differences between enrollment methods and the safe management of the devices over their entire lifecycle. With this … Read more

With an important security update: MacOS 15.3.2 and iOS 18.3.2 available

With an important security update: MacOS 15.3.2 and iOS 18.3.2 available

For users of iPhone, iPad, Mac, Vision Pro and Apple TV, Important updates are waiting in software updates in the system settings: Apple has presented updates late on Tuesday evening. It is not functional updates, but error deposits – together with at least one heavy vulnerability. Advertisement Streaming problem and old gap IOS 18.3.2 and … Read more

Browser updates: Stuffed security gaps-and µ block turned off

Browser updates: Stuffed security gaps-and µ block turned off

Mozilla has published Security Updates for all currently supported Firefox and Thunderbird versions, Google for the Chrome web browser. Chrome is now also blocking the µblock AdBlocker – but it can be activated again with a few simple steps. Advertisement The Mozilla developers have Firefox in the Versions 136,, ESR 128.8 as well as ESR … Read more

iOS 18: Apple extends information about security patches, but not with everyone

iOS 18: Apple extends information about security patches, but not with everyone

With the appearance of iOS 18, Apple had plugged numerous, even heavy security gaps in September. The associated Support document With further information, which bugs this was concrete, however, as often often, in the past, it was incomplete. Like the mastodon account @applsec writeswho pursues Apple security gaps, Apple has submitted some backgrounds this week, … Read more

Security researchers use Apple's “Where is?” To track all Bluetooth devices

Security researchers use Apple's "Where is?" To track all Bluetooth devices

Apple actually applies “where is?” Network, which can transmit the location of Apple devices such as iPhones and MacBooks, Airtags and other compatible devices as safe and protected via Bluetooth and Ultra-Wideband radio. In the past, there have already been methods of how the network could be used to transfer further, actually not intended data. … Read more

Parallels desktop: Security researcher publishes Zero-Day Exploit

Parallels desktop: Security researcher publishes Zero-Day Exploit

An apparently inadequate patched security gap in parallel desktop could enable a local attacker to achieve root rights in MacOS-and thus take control of the computer. A security researcher has now released the associated zero-day exploit for this weak point in two variants. He wanted to create a problem awareness and urge the software to … Read more