Cyber Security News
North Korean Hackers Attacking macOS Using Weaponized Documents
Hackers often use weaponized documents to exploit vulnerabilities in software, which enables the execution of malicious code.All these documents contain malicious code or macros,...
Cyber Security News
BlueNoroff Hackers Attacking Apple Users with New macOS Malware
A new malware variant is distributed by BlueNordoff APT group, a financially motivated threat group targeting cryptocurrency exchanges, venture capital firms, and banks.This new...
CVE/vulnerability
VMware Tools Flaw Let Attackers Escalate Privileges
Two high vulnerabilities have been discovered in VMware Tools, which were assigned with CVE-2023-34057 and CVE-2023-34058. These vulnerabilities were associated with Local Privilege Escalation...
Cyber Security News
Memory Corruption Flaw in ncurses API Library Exposes Linux and macOS Systems
Multiple memory corruption vulnerabilities have been discovered in the ncurses library, which various programs use on multiple operating systems like Portable Operating System Interface...
Cyber Security News
Hackers Using BlueShell Malware to Attack Windows, Linux, and Mac Systems
The usage of Blueshell malware spikes up by various threat actors to target Windows, Linux, and other operating systems across Korea and Thailand.Blueshell backdoor...
Computer Security
Operating Systems Can be Detected Using Ping Command
Operating Systems can be detected using Ping Command, Ping is a computer network administration software utility, used to find the Availability of a host...
Cyber Security News
Hackers are Selling a new Atomic macOS (AMOS) Stealer on Telegram
Atomic macOS Stealer (AMOS) is a recent information-stealing malware capable of attacking macOS to steal confidential information.This malware was discovered by Cyble Research and...
macOS
Microsoft Details Techniques Used by Hackers to Deliver Ransomware to macOS Devices
One of the most dominating threats in the current cyberspace era is ransomware which is constantly affecting organizations of all sizes. In order to...