![]() ![]() ![]() "While such attacks are growing in popularity, current attacks are (still) rather lame!" Wardle wrote in his blog post. Wardle's hack chains together exploits of several vulnerabilities, the most important of which is a plain old Office macro, a simple script that automates tasks for the convenience of the user. Tom's Guide approached Apple for comment, and we were pointed to the macOS Catalina release notes linked to above. Wardle plans to further demonstrate and detail his attack method in a virtual presentation at the Black Hat security conference on August 5. (Wardle said he got no acknowledgement from Apple in the macOS Catalina 10.15.3 release notes until he "confronted" the company.) Microsoft fixed its flaws that month, and the Mac flaws were patched by Apple with the release of macOS 10.15.3 Catalina back in January 2020.
0 Comments
Leave a Reply. |