Mac malware campaign uses fake AI chat results to deliver AMOS through terminal commands, security researchers report.
A new variant of the MacSync Stealer uses a code-signed Swift application to get around Apple's macOS Gatekeeper protections.
MacSync Stealer, by contrast, is downloaded from an ordinary-looking utility URL as a code-signed and notarized Swift ...
The text and code editing tool EmEditor was targeted in a supply chain attack that resulted in the distribution of ...
New MacSync Stealer version is executed via a signed and notarized Swift application, eliminating the need for direct ...
We’ve recently seen how ChatGPT was used to trick Mac users into installing MacStealer, and now a different tactic ...
Transparent Tribe (APT36) is linked to new cyber-espionage attacks using malicious LNK files, adaptive RATs, and long-term ...
A new version of the MacSync Stealer malware has been found masquerading as a legitimate, notarized app. It bypasses standard macOS security warnings to harvest credentials and crypto wallets.
Blind Eagle launches new multi-stage malware attacks via spear-phishing to compromise systems and deploy memory-resident payloads.
Business-grade email server software SmarterMail just patched a maximum-severity vulnerability that allowed threat actors to ...
Hackers behind the Shai Hulud malicious npm JavaScript campaign are likely testing a new variant of the malware. Security ...
The malware, a reworked version of the MacSync Stealer, departs from earlier delivery methods and adopts a quieter, more ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results