Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 3 / 10
184 résultats taggé macos  ✕
Apple Rolls Out Security Updates for iOS, macOS https://www.securityweek.com/apple-rolls-out-security-updates-for-ios-macos
03/08/2024 21:08:56
QRCode
archive.org

Apple on Monday announced a hefty round of security updates that address dozens of vulnerabilities impacting both newer and older iOS and macOS devices.

iOS 17.6 and iPadOS 17.6 were released for the latest generation iPhone and iPad devices with fixes for 35 security defects that could lead to authentication and policy bypasses, unexpected application termination or system shutdown, information disclosure, denial-of-service (DoS), and memory leaks.

securityweek EN 2024 macos ios ipados Security Updates for iOS iOS17.6
Malicious Python Package Targets macOS Developers https://checkmarx.com/blog/malicious-python-package-targets-macos-developers-to-access-their-gcp-accounts/?ref=news.risky.biz
29/07/2024 09:26:47
QRCode
archive.org
thumbnail
  • A package called “lr-utils-lib” was uploaded to PyPi in early June 2024, containing malicious code that executes automatically upon installation.
  • The malware uses a list of predefined hashes to target specific macOS machines and attempts to harvest Google Cloud authentication data.
  • The harvested credentials are sent to a remote server.
checkmarx EN 2024 macOS stealer Supply-chain-attack PyPI pypi-malware lr-utils-lib developpers
OpenAI’s ChatGPT Mac app was storing conversations in plain text https://www.theverge.com/2024/7/3/24191636/openai-chatgpt-mac-app-conversations-plain-text
04/07/2024 07:20:32
QRCode
archive.org
thumbnail

OpenAI updated its ChatGPT macOS app on Friday after users discovered it stored conversations insecurely in plain text.

theverge EN 2024 OpenAI chatgpt macOS app plain-text
3 million iOS and macOS apps were exposed to potent supply-chain attacks https://arstechnica.com/security/2024/07/3-million-ios-and-macos-apps-were-exposed-to-potent-supply-chain-attacks/
03/07/2024 08:26:52
QRCode
archive.org
thumbnail

Apps that used code libraries hosted on CocoaPods were vulnerable for about 10 years.

arstechnica EN macOS iOS CVE-2024-38367 CocoaPods
Vulnerabilities in CocoaPods Open the Door to Supply Chain Attacks Against Thousands of iOS and MacOS Applications https://www.evasec.io/blog/eva-discovered-supply-chain-vulnerabities-in-cocoapods
02/07/2024 18:58:38
QRCode
archive.org
thumbnail
  • E.V.A Information Security researchers uncovered several vulnerabilities in the CocoaPods dependency manager that allows any malicious actor to claim ownership over thousands of unclaimed pods and insert malicious code into many of the most popular iOS and MacOS applications. These vulnerabilities have since been patched.
  • Such an attack on the mobile app ecosystem could infect almost every Apple device, leaving thousands of organizations vulnerable to catastrophic financial and reputational damage. One of the vulnerabilities could also enable zero day attacks against the most advanced and secure organizations’ infrastructure.
  • Developers and DevOps teams that have used CocoaPods in recent years should verify the integrity of open source dependencies used in their application code.
  • Dependency managers are an often-overlooked aspect of software supply chain security. Security leaders should explore ways to increase governance and oversight over the use these tools.
evasec EN 2024 CocoaPods Supply Chain Attacks macOS iOS CVE-2024-38368
Des cybercriminels diffusent des maliciels pour macOS au nom d’AGOV https://www.ncsc.admin.ch/ncsc/fr/home/aktuell/im-fokus/2024/poseidon.html
30/06/2024 15:08:36
QRCode
archive.org

28.06.2024 - Le soir du 27 juin 2024, des cybercriminels ont lancé une campagne de « malspam » à grande échelle contre des citoyennes et citoyens de Suisse alémanique. Par le biais d’un e-mail dont l’expéditeur présumé est AGOV, ils tentent d’infecter les appareils des utilisatrices et utilisateurs de macOS avec un maliciel (malware en anglais) du nom de « Poseidon Stealer ».

ncsc admin.ch FR CH suisse campagne malspam macOS AGOV PoseidonStealer
CVE-2024-27822: macOS PackageKit Privilege Escalation https://khronokernel.com/macos/2024/06/03/CVE-2024-27822.html
05/06/2024 08:41:53
QRCode
archive.org

Another fun exploit! This time with local privilege escalation through Apple’s PackageKit.framework when running ZSH-based PKGs 🎉.

khronokernel CVE-2024-27822 EN 2024 ZSH macos package pkg
PoC Exploit Released For macOS Privilege Escalation Vulnerability https://gbhackers.com/poc-exploit-macos-privilege-escalation/#google_vignette
30/05/2024 09:37:03
QRCode
archive.org
thumbnail

A new vulnerability has been discovered in macOS Sonoma that is associated with privilege escalation. This vulnerability has been assigned

gbhackers EN 2024 CVE-2024-27842 PoC Exploit Released macOS
Malicious PyPI packages targeting highly specific MacOS machines https://securitylabs.datadoghq.com/articles/malicious-pypi-package-targeting-highly-specific-macos-machines/
24/05/2024 11:22:40
QRCode
archive.org
thumbnail

In this post, we analyze a cluster of malicious PyPI packages targeting specific MacOS machines.

datadoghq EN 2024 macos PyPI packages Supply-chain-attack
An Infostealer's Brewin': Cuckoo & AtomicStealer Get Creative https://alden.io/posts/infostealers-a-brewin/
15/05/2024 20:54:08
QRCode
archive.org
thumbnail

Recent infostealer malware campaign utilizing fake Homebrew websites to deliver Cuckoo and AtomicStealer.

alden EN 2024 macOS Malware RE CTI AMOS Infostealer Homebrew
Malicious Go Binary Delivered via Steganography in PyPI https://blog.phylum.io/malicious-go-binary-delivered-via-steganography-in-pypi/
14/05/2024 10:34:12
QRCode
archive.org
thumbnail

On May 10, 2024, Phylum’s automated risk detection platform alerted us to a suspicious publication on PyPI. The package was called requests-darwin-lite and appeared to be a fork of the ever-popular requests package with a few key differences, most notably the inclusion of a malicious Go binary packed into

phylum EN 2024 Steganography macOS Go
Safari Flaw Can Expose iPhone Users in the EU to Tracking https://www.mysk.blog/2024/04/28/safari-tracking/
09/05/2024 13:38:14
QRCode
archive.org

Apple's implementation of installing marketplace apps from Safari is heavily flawed and can allow a malicious marketplace to track users across websites

mysk EN 2024 ios macos safari Flaw iPhone EU Tracking
macOS Adload | Prolific Adware Pivots Just Days After Apple’s XProtect Clampdown  https://www.sentinelone.com/blog/macos-adload-prolific-adware-pivots-just-days-after-apples-xprotect-clampdown/
02/05/2024 13:44:31
QRCode
archive.org
thumbnail

Learn about the latest Adload adware variants, written in Go and intended to bypass Apple's recent XProtect updates.

sentinelone EN 2024 macOS Adload Apple
Bringing process injection into view(s): exploiting all macOS apps using nib files · Sector 7 https://sector7.computest.nl/post/2024-04-bringing-process-injection-into-view-exploiting-all-macos-apps-using-nib-files/
05/04/2024 15:45:54
QRCode
archive.org
thumbnail

In a previous blog post we described a process injection vulnerability affecting all AppKit-based macOS applications. This research was presented at Black Hat USA 2022, DEF CON 30 and Objective by the Sea v5. This vulnerability was actually the second universal process injection vulnerability we reported to Apple, but it was fixed earlier than the first. Because it shared some parts of the exploit chain with the first one, there were a few steps we had to skip in the earlier post and the presentations. Now that the first vulnerability has been fixed in macOS 13.0 (Ventura) and improved in macOS 14.0 (Sonoma), we can detail the first one and thereby fill in the blanks of the previous post.

This vulnerability was independently found by Adam Chester and written up here under the name “DirtyNIB”. While the exploit chain demonstrated by Adam shares a lot of similarity to ours, our attacks trigger automatically and do not require a user to click a button, making them a lot more stealthy. Therefore we decided to publish our own version of this write-up as well.

sector7 EN 2024 macos nib exploit research vulnerability DirtyNIB
Infostealers continue to pose threat to macOS users https://www.jamf.com/blog/infostealers-pose-threat-to-macos/?ref=news.risky.biz
01/04/2024 10:41:09
QRCode
archive.org
thumbnail

Jamf Threat Labs dissects ongoing infostealer attacks targeting macOS users. Each with different means of compromising victim’s Macs but with similar aims: to steal sensitive user data.

jamf EN 2024 Infostealer macOS AtomicStealer stealer sponsored-ads Meethub
How AMOS macOS Stealer Avoids Detection https://blog.kandji.io/amos-macos-stealer-analysis
05/03/2024 09:44:37
QRCode
archive.org
thumbnail

Kandji threat analysis reveals how the AMOS macOS stealer constantly changes its hash signatures while maintaining its functionality.

kandji EN 2024 AMOS macOS Stealer
Jamf says 9% of smartphone have fallen for phishing attacks https://appleinsider.com/articles/24/02/22/apple-users-are-increasingly-falling-victim-to-malware-phishing-and-viruses
22/02/2024 22:14:16
QRCode
archive.org
thumbnail

In a report going over the state of malware in 2024, device management firm Jamf says that 9% of mobile users were caught by phishing, while 20% of companies were at risk because of bad smartphone configurations.

appleinsider EN 2024 smartphone phishing macos ios report Statistics
New MacOS Backdoor Written in Rust Shows Possible Link with Windows Ransomware Group https://www.bitdefender.com/blog/labs/new-macos-backdoor-written-in-rust-shows-possible-link-with-windows-ransomware-group/
13/02/2024 09:12:38
QRCode
archive.org
thumbnail

Bitdefender researchers have discovered a new backdoor targeting Mac OS users.

bitdefender EN 2024 macOS Backdoor rust Trojan.MAC.RustDoor analysis
New RustDoor macOS malware impersonates Visual Studio update https://www.bleepingcomputer.com/news/security/new-rustdoor-macos-malware-impersonates-visual-studio-update/
09/02/2024 17:20:46
QRCode
archive.org
thumbnail

A new Rust-based macOS malware spreading as a Visual Studio update to provide backdoor access to compromised systems uses infrastructure linked to the infamous ALPHV/BlackCat ransomware gang.

bleepingcomputer EN 2024 ALPHV Backdoor BlackCat Data-Exfiltration macOS Malware Ransomware
A backdoor with a cryptowallet stealer inside cracked macOS software https://securelist.com/new-macos-backdoor-crypto-stealer/111778/
22/01/2024 10:41:52
QRCode
archive.org
thumbnail

We review a new macOS backdoor that piggybacks on cracked software to replace Bitcoin and Exodus wallets with malware.

securelist EN 2024 Apple MacOS Backdoor Cryptocurrencies DNS Malware Malware-Descriptions Malware-Technologies Trojan Trojan-stealer
page 3 / 10
4507 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio