Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: Mac malware

  1. Home
  2. Mac malware

New Banshee Stealer macOS Malware Priced at $3,000 Per Month

Russian cybercriminals are advertising a new macOS malware, Banshee Stealer, capable of stealing passwords, browser data, and crypto wallets. 

The post New Banshee Stealer macOS Malware Priced at $3,000 Per Month appeared first on SecurityWeek.

Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate

Red Canary’s 2024 Threat Detection Report is based on analysis of almost 60,000 threats across 216 petabytes of telemetry from over 1,000 customers’ endpoints.

The post Threat Detection Report: Cloud Attacks Soar, Mac Threats and Malvertising Escalate appeared first on SecurityWeek.

New macOS Backdoor Linked to Prominent Ransomware Groups

Written in Rust, the new RustDoor macOS backdoor appears linked to Black Basta and Alphv/BlackCat ransomware.

The post New macOS Backdoor Linked to Prominent Ransomware Groups appeared first on SecurityWeek.

New ‘SpectralBlur’ macOS Backdoor Linked to North Korea

SpectralBlur is a new macOS backdoor that shows similarities with North Korean hacking group’s KandyKorn malware.

The post New ‘SpectralBlur’ macOS Backdoor Linked to North Korea appeared first on SecurityWeek.

21 New Mac Malware Families Emerged in 2023

A total of 21 new malware families targeting macOS systems were discovered in 2023, a 50% increase compared to 2022. 

The post 21 New Mac Malware Families Emerged in 2023 appeared first on SecurityWeek.

New ‘Turtle’ macOS Ransomware Analyzed

New Turtle macOS ransomware is not sophisticated but shows that cybercriminals continue to target Apple devices.

The post New ‘Turtle’ macOS Ransomware Analyzed appeared first on SecurityWeek.

North Korean Hackers Use New ‘KandyKorn’ macOS Malware in Attacks

north-korean-hackers-use-new-‘kandykorn’-macos-malware-in-attacks

Security researchers uncover new macOS and Windows malware associated with the North Korea-linked Lazarus Group.

The post North Korean Hackers Use New ‘KandyKorn’ macOS Malware in Attacks appeared first on SecurityWeek.

macOS Info-Stealer Malware ‘MetaStealer’ Targeting Businesses

macos-info-stealer-malware-‘metastealer’-targeting-businesses

The MetaStealer macOS information stealer has been targeting businesses to exfiltrate keychain and other valuable information.

The post macOS Info-Stealer Malware ‘MetaStealer’ Targeting Businesses appeared first on SecurityWeek.

‘Atomic macOS Stealer’ Malware Delivered via Malvertising Campaign

‘atomic-macos-stealer’-malware-delivered-via-malvertising-campaign

A malware named Atomic macOS Stealer (AMOS) has been delivered to users via a malvertising campaign. 

The post ‘Atomic macOS Stealer’ Malware Delivered via Malvertising Campaign appeared first on SecurityWeek.

New hVNC macOS Malware Advertised on Hacker Forum

new-hvnc-macos-malware-advertised-on-hacker-forum

A new macOS-targeting hVNC malware family is being advertised on a prominent cybercrime forum.

The post New hVNC macOS Malware Advertised on Hacker Forum appeared first on SecurityWeek.

  • 1
  • 2
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it