By Juan Andres Guerrero-Saade, Asaf Gilboa, David Acs, James Haughom, Phil Stokes & SentinelLabs Executive Summary As of Mar 22, 2023 SentinelOne began to see
Tag: APPLE
The scourge of ransomware attacks that has plagued Windows endpoints over the past half decade or so has, thankfully, not been replicated on Mac devices.
ChatGPT, the AI-powered chatbot developed by OpenAI lab, rocketed to fame within just four months of its launch. Unfortunately, the success of the viral AI
Investigators: Nico Agnese, Maor Elizen, Marion Habiby, Ryan Joye, Vikas Parthasarathy, Adam Sell, Mikhail Venkov In this post: HUMAN’s Satori Threat Intelligence and Research Team
Affected Platforms: All OSImpacted Parties: Online ShoppersImpact: Loss of personally identifiable information and/or moneySeverity Level: Low As we approach the end of 2022, we reflect
Editor’s Note: This is an excerpt of a full report. To read the entire analysis with endnotes, click here to download the report as a
This post is also available in: 日本語 (Japanese) Executive Summary In May 2021, Palo Alto Networks launched a proactive detector employing state-of-the-art methods to recognize
Minutes make the difference to defenders in responding to a ransomware attack on a victim’s network. BianLian ransomware raises the cybercriminal bar by encrypting files
Contributions from Matt Thaxton. Cisco Talos discovered a new attack framework including a command and control (C2) tool called “Alchimist” and a new malware “Insekt”
Fake Windows Defender Alerts weaponized to target users A tech support scam is an extensive fraud where the scammer offers a support service for any
Back in August, researchers at ESET spotted an instance of Operation In(ter)ception using lures for job vacancies at cryptocurrency exchange platform Coinbase to infect macOS
This post is also available in: 日本語 (Japanese) Executive Summary Cybercriminals compromise domain names to attack the owners or users of the domains directly, or
Beginning with macOS 10.12 (Sierra), Apple introduced a key change to how logging was done on their systems. This new logging system replaced common Unix logs with macOS Unified Logs. These logs can provide forensic investigators a valuable artifact to aid in investigating macOS systems or other Apple devices.
In this…
Following the recent Twilio hack leading to the leakage of 2FA (OTP) codes, cybercriminals continue to upgrade their attack arsenal to orchestrate advanced phishing campaigns
Threat actors behind the XCSSET malware have been relatively quiet since last year. However, new activity beginning around April 2022 and increasing through May to