Skip to content

Cybersecurity News Everyday

Stay Ahead of Cyber Threats – Daily Security Insights, Powered by AI

Tag: APPLE

Threat Research

SmoothOperator | Ongoing Campaign Trojanizes 3CXDesktopApp in Supply Chain Attack

March 24, 2023May 24, 2024 Securonix

By Juan Andres Guerrero-Saade, Asaf Gilboa, David Acs, James Haughom, Phil Stokes & SentinelLabs Executive Summary As of Mar 22, 2023 SentinelOne began to see

Read More
Threat Research

Session Cookies, Keychains, SSH Keys and More | 7 Kinds of Data Malware Steals from macOS Users

March 20, 2023May 24, 2024 Securonix

The scourge of ransomware attacks that has plagued Windows endpoints over the past half decade or so has, thankfully, not been replicated on Mac devices.

Read More
Threat Research

Bitdefender Labs warns of fresh phishing campaign that uses copycat ChatGPT platform to swindle eager investors

February 28, 2023May 24, 2024 Securonix

ChatGPT, the AI-powered chatbot developed by OpenAI lab, rocketed to fame within just four months of its launch. Unfortunately, the success of the viral AI

Read More
Threat Research

Traffic signals: The VASTFLUX Takedown

January 17, 2023May 24, 2024 Securonix

Investigators: Nico Agnese, Maor Elizen, Marion Habiby, Ryan Joye, Vikas Parthasarathy, Adam Sell, Mikhail Venkov In this post: HUMAN’s Satori Threat Intelligence and Research Team

Read More
Threat Research

Beware of Cybercriminals Preying on Online Shoppers on Black Friday | FortiGuard Labs

November 17, 2022May 24, 2024 Securonix

Affected Platforms: All OSImpacted Parties: Online ShoppersImpact: Loss of personally identifiable information and/or moneySeverity Level: Low As we approach the end of 2022, we reflect

Read More
Threat Research

Fielding Threats: Cyber, Influence, and Physical Threats to the 2022 FIFA World Cup in Qatar | Recorded Future

November 15, 2022May 24, 2024 Securonix

Editor’s Note: This is an excerpt of a full report. To read the entire analysis with endnotes, click here to download the report as a

Read More
Threat Research

Detecting Emerging Network Threats From Newly Observed Domains

October 12, 2022May 24, 2024 Securonix

This post is also available in: 日本語 (Japanese) Executive Summary In May 2021, Palo Alto Networks launched a proactive detector employing state-of-the-art methods to recognize

Read More
Threat Research

BianLian Ransomware Encrypts Files in the Blink of an Eye

October 10, 2022May 24, 2024 Securonix

Minutes make the difference to defenders in responding to a ransomware attack on a victim’s network. BianLian ransomware raises the cybercriminal bar by encrypting files

Read More
Threat Research

Alchimist: A new attack framework in Chinese for Mac, Linux and Windows

October 7, 2022May 24, 2024 Securonix

Contributions from Matt Thaxton. Cisco Talos  discovered a new attack framework including a command and control (C2) tool called “Alchimist” and a new malware “Insekt”

Read More
Threat Research

Cyble – Massive Tech Support Scam Exposed

October 7, 2022May 24, 2024 Securonix

Fake Windows Defender Alerts weaponized to target users A tech support scam is an extensive fraud where the scammer offers a support service for any

Read More
Threat Research

Lazarus ‘Operation In(ter)ception’ Targets macOS Users Dreaming of Jobs in Crypto

September 26, 2022May 24, 2024 Securonix

Back in August, researchers at ESET spotted an instance of Operation In(ter)ception using lures for job vacancies at cryptocurrency exchange platform Coinbase to infect macOS

Read More
Threat Research

Domain Shadowing: A Stealthy Use of DNS Compromise for Cybercrime

September 16, 2022May 24, 2024 Securonix

This post is also available in: 日本語 (Japanese) Executive Summary Cybercriminals compromise domain names to attack the owners or users of the domains directly, or

Read More
Threat Research

macOS Unified Logs | Challenges Related to the Unified Logs

August 31, 2022May 24, 2024 GoogleCloudIntel

Beginning with macOS 10.12 (Sierra), Apple introduced a key change to how logging was done on their systems. This new logging system replaced common Unix logs with macOS Unified Logs. These logs can provide forensic investigators a valuable artifact to aid in investigating macOS systems or other Apple devices.

In this…

Read More
Threat Research

EvilProxy Phishing-as-a-Service with MFA Bypass Emerged in Dark Web

August 26, 2022May 24, 2024 Securonix

Following the recent Twilio hack leading to the leakage of 2FA (OTP) codes, cybercriminals continue to upgrade their attack arsenal to orchestrate advanced phishing campaigns

Read More
Threat Research

XCSSET Malware Update | macOS Threat Actors Prepare for Life Without Python

August 15, 2022May 24, 2024 Securonix

Threat actors behind the XCSSET malware have been relatively quiet since last year. However, new activity beginning around April 2022 and increasing through May to

Read More

Posts pagination

Previous 1 … 44 45 46 Next

What are you looking for ?

  • 🖥️ [ D A S H B O A R D ]
  • 🕵️‍♂️ Threat Research
  • 📰 Security News
  • 🚨 Attack & Data Breach
  • 🛑 Ransomware Monitor
  • 💀 Hacked! Web Defacement
  • ✨ Interesting Stuff
  • 📺 Youtube Overview
  • 🔍 Google Cybersecurity
  • 📢 Telegram Notification
  • 📰 News Daily Recap
  • 📰 Security Report
Twitter/X @TweetThreatNews
Facebook @Cybersecurity
LinkedIn Hendry Adrian
Support this website

Website Disclaimer