Wednesday, December 25, 2024

macOS

North Korean Hackers Attacking macOS Using Weaponized Documents

Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code.All these documents contain malicious code or macros,...

BlueNoroff Hackers Attacking Apple Users with New macOS Malware

A new malware variant is distributed by BlueNordoff APT group, a financially motivated threat group targeting cryptocurrency exchanges, venture capital firms, and banks.This new...

VMware Tools Flaw Let Attackers Escalate Privileges

Two high vulnerabilities have been discovered in VMware Tools, which were assigned with CVE-2023-34057 and CVE-2023-34058. These vulnerabilities were associated with Local Privilege Escalation...

Memory Corruption Flaw in ncurses API Library Exposes Linux and macOS Systems

Multiple memory corruption vulnerabilities have been discovered in the ncurses library, which various programs use on multiple operating systems like Portable Operating System Interface...

Hackers Using BlueShell Malware to Attack Windows, Linux, and Mac Systems

The usage of Blueshell malware spikes up by various threat actors to target Windows, Linux, and other operating systems across Korea and Thailand.Blueshell backdoor...

Operating Systems Can be Detected Using Ping Command

Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...

Hackers are Selling a new Atomic macOS (AMOS) Stealer on Telegram

Atomic macOS Stealer (AMOS) is a recent information-stealing malware capable of attacking macOS to steal confidential information.This malware was discovered by Cyble Research and...

Microsoft Details Techniques Used by Hackers to Deliver Ransomware to macOS Devices

One of the most dominating threats in the current cyberspace era is ransomware which is constantly affecting organizations of all sizes. In order to...