meta_pixel
Tapesearch Logo
Log in
CyberWire Daily

Beyond the permissions wall. [Research Saturday]

CyberWire Daily

N2K Networks, Inc.

Daily News, Tech News, News, Technology

4.61K Ratings

🗓️ 28 September 2024

⏱️ 16 minutes

🧾️ Download transcript

Summary

We are joined by Yves Younan, Senior Manager, Talos Vulnerability Discovery and Research from Cisco, discussing their work on "How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions." Cisco Talos has uncovered eight vulnerabilities in Microsoft applications for macOS that could allow attackers to exploit the system's permission model by injecting malicious libraries. By leveraging permissions already granted to these apps, attackers could gain access to sensitive resources like the microphone, camera, and screen recording without user consent. While Microsoft considers these issues low risk and has declined to fix them, the vulnerabilities pose a potential threat to user privacy and security. The research can be found here: How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to the CyberWire Network, powered by N2K.

0:07.0

Hey everybody, Dave here.

0:14.7

Have you ever wondered where your personal information is lurking online?

0:19.6

Like many of you, I was concerned about my data being sold by data brokers.

0:24.0

So I decided to try Delete Me.

0:27.0

I have to say, Delete Me is a game changer.

0:30.0

Within days of signing up, they started removing my personal information from hundreds of data brokers.

0:36.0

I finally have peace of mind knowing my data privacy is protected.

0:41.0

The Leopney's team does all the work for you with detailed reports so you know exactly what's been done.

0:47.0

Take control of your data and keep your private life private by signing up for Delete Me.

0:52.0

Now at a special discount for our listeners, private by signing up for Delete Me.

0:52.7

Now at a special discount for our listeners,

0:55.2

today get 20% off your Delete Me plan

0:58.4

when you go to Join Delete Me.com slash N2K and use promo code n two k at check out the only way to get

1:06.4

20% off is to go to join delete me dot com slash n two k and enter code n two k at check out. That's join delete me.com slash n2k

1:17.0

code n2k. Hello everyone and welcome to the CyberWire's research Saturday.

1:34.0

I'm Dave Bitner and this is our weekly conversation with researchers and analysts

1:39.0

tracking down the threats and vulnerabilities, solving some of the hard problems and protecting ourselves in a rapidly evolving cyberspace.

1:47.0

Thanks for joining us. So one of the researchers on the team was interested in how applications used entitlements on Mac OS and started looking at them and found out that there were some vulnerabilities

2:06.4

in Microsoft applications.

2:09.2

That's Eve Yonen, senior manager with TALOS Vulnerability Discovery and Research at Cisco.

2:15.0

The research we're discussing today is titled

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from N2K Networks, Inc., and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of N2K Networks, Inc. and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.