How To Run a Script To Bypass Security Bug for macOS (versions 10.15 to 11.2)

A serious security bug, with the identifier CVE-2021-30657, has recently been publicized and patched. However, it has been used in the […]

Addigy | 04/29/2021
Filters
  • Addigy News
  • Industry Insights
  • Product
  • Security
  • Uncategorized
  • Craig Richards
  • Addigy
  • Jason Dettbarn
  • Joel Cedano
  • John Sutcliffe
  • Kyle Bareis
  • Nicolas Ponce
  • Jason Bahls
  • 2FA
  • Addigy Community
  • Addigy Identity
  • Alerts
  • Apple
  • Apple Business Manager
  • Apple Device Management
  • apple mdm
  • Apple School Manager
  • apple security
  • Automated Device Enrollment
  • Automated Enrollment
  • BCDR
  • big script
  • Budget
  • bug
  • Business Continuity
  • BYOD
  • bypass
  • Catalina
  • Community Scripts
  • CYOD
  • Device Deployment
  • device enrollment
  • Device Facts
  • device management
  • Disaster Recovery
  • Education
  • End User Productivity
  • Enterprise
  • Features
  • GoLive
  • Insider Threat
  • Integrations
  • Inventory
  • iOS
  • iPadOS
  • IT automation
  • it security
  • LANCache
  • mac management
  • macOS
  • Malware
  • MDM
  • MFA
  • Migration
  • mobile device management
  • Monitoring
  • MSP
  • MSPs
  • Network
  • Network Visibility
  • Operational Efficiency
  • Patch Management
  • Remediation
  • Remote Monitoring Management
  • Remote Workforce
  • Restrictions Payload
  • Scripting
  • Security
  • security bug
  • self service
  • silversparrow
  • Software Update
  • SSO
  • Support
  • User Experience
  • Windows
  • WWDC
  • zero touch deployment
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
With many employees working remotely, more and more businesses turn to trusted IT advisors to help with properly securing networks and […]
When most people think about the Apple brand, the iPhone immediately comes to mind, but that’s changing. The tech giant, known […]
This is the first in a three-part blog series that will provide tactical approaches for setting up alerts and remediation to […]