Mosyle, a popular Apple device management and security firm, has exclusively shared details with 9to5Mac on a previously unknown ...
Everyday Mac users are now a common target for hackers and one of the key ways they attempt to infiltrate the systems is ...
Mosyle has identified a macOS malware campaign that uses generative AI-assisted code and spreads through a fake AI app ...
Just yesterday, we noted the growing threat of ransomware. Now, Jamf Threat Labs is warning that North Korean threat actors ...
Another day, another macOS malware is trying to actively exploit your Mac. This time, North Korean hackers are using fake job offers hidden in updates to popular apps like Zoom and Google Chrome to ...
Jamf reports North Korean actors using fake job ads and ClickFix tactics to target macOS users Victims are tricked into running curl commands in Terminal, installing FlexibleFerret backdoor malware ...
North Korean threat actor BlueNoroff has been targeting crypto-related businesses with a new multi-stage malware for macOS systems. Researchers are calling the campaign Hidden Risk and say that it ...
Hosted on MSN
New macOS malware uses Apple's own code to quietly steal credentials and personal data — how to stay safe
While Apple's Macs aren't targeted by hackers as often as Windows PCs, they're far from impenetrable. Security researchers at Check Point Research recently pushed out an alert warning 100 million ...
Security researchers have discovered new macOS malware that apparently comes from a North Korean hacking group out to target cryptocurrency-related businesses, reports PC Mag. “Hidden Risk” malware ...
MacOS malware XCSSET is reportedly re-emerging under a new variant, according to Microsoft. In a new social media post published on February 17, Microsoft Threat Intelligence said it had detected a ...
North Korean hackers are using fake job offers and disguised app updates to sneak malware onto Macs, and while Apple's latest XProtect update blocks some threats, others are still slipping through.
Cybercriminals use ErrTraffic tool to automate malware distribution through fake browser error messages, with attacks achieving 60% conversion rates.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results