<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Apple Ships Emergency Patches for 'Actively Exploited' macOS, iOS Flaws in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Apple-Ships-Emergency-Patches-for-Actively-Exploited-macOS-iOS/m-p/50373#M3432</link>
    <description>&lt;P&gt;For those that haven't seen the alert.&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;Apple confirmed the two security defects -- CVE-2022-22675 and CVE-2022-22674 -- in all its major operating systems and warned that remote code execution attacks may already be underway.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;A href="https://www.securityweek.com/apple-ships-emergency-patches-actively-exploited-macos-ios-flaws" target="_blank" rel="noopener"&gt;https://www.securityweek.com/apple-ships-emergency-patches-actively-exploited-macos-ios-flaws&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Patch those iPhones&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;d&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 02 Apr 2022 02:34:03 GMT</pubDate>
    <dc:creator>dcontesti</dc:creator>
    <dc:date>2022-04-02T02:34:03Z</dc:date>
    <item>
      <title>Apple Ships Emergency Patches for 'Actively Exploited' macOS, iOS Flaws</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Apple-Ships-Emergency-Patches-for-Actively-Exploited-macOS-iOS/m-p/50373#M3432</link>
      <description>&lt;P&gt;For those that haven't seen the alert.&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;Apple confirmed the two security defects -- CVE-2022-22675 and CVE-2022-22674 -- in all its major operating systems and warned that remote code execution attacks may already be underway.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;&lt;A href="https://www.securityweek.com/apple-ships-emergency-patches-actively-exploited-macos-ios-flaws" target="_blank" rel="noopener"&gt;https://www.securityweek.com/apple-ships-emergency-patches-actively-exploited-macos-ios-flaws&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;Patch those iPhones&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;d&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 02 Apr 2022 02:34:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Apple-Ships-Emergency-Patches-for-Actively-Exploited-macOS-iOS/m-p/50373#M3432</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2022-04-02T02:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: Apple Ships Emergency Patches for 'Actively Exploited' macOS, iOS Flaws</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Apple-Ships-Emergency-Patches-for-Actively-Exploited-macOS-iOS/m-p/50385#M3436</link>
      <description>&lt;P&gt;An interesting side note that I saw, when Apple updates come out people can first get them when you manually check for and install the update. Otherwise it take a week or two before the update comes down as an auto update. Just find it interesting how they stage this stuff.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;John-&lt;/P&gt;</description>
      <pubDate>Sun, 03 Apr 2022 20:43:18 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Apple-Ships-Emergency-Patches-for-Actively-Exploited-macOS-iOS/m-p/50385#M3436</guid>
      <dc:creator>JKWiniger</dc:creator>
      <dc:date>2022-04-03T20:43:18Z</dc:date>
    </item>
  </channel>
</rss>

