‘Migraine’ Flaw Let Hackers Bypass macOS Security Integrity
A recently discovered vulnerability called "Migraine" is linked to macOS migration and poses a serious threat.
It enables attackers with root privileges to circumvent System Integrity Protection (SIP) on macOS, granting them unrestricted control over...
JokerSpy – Multi-Stage macOS Malware Attacking Organisation Worldwide
MacOS is reported to be one of the most security Operating Systems. As of the beginning of 2023, there are over 100 million macOS devices worldwide. Due to its popularity, threat actors have begun...
Cyber Criminals Turned Mac Systems into Proxy Exit Nodes
Besides Windows OS, now threat actors are also actively targeting Mac systems to accomplish their illicit goals. Cybersecurity analysts at AT&T Alien Labs recently observed that threat actors are actively turning Mac systems into...
XLoader malware Attacking macOS Users Disguised as Signed OfficeNote App
XLoader has been serving as a particularly persistent and adaptable threat since 2015. With its roots deeply ingrained in the digital landscape, XLoader has undergone a transformative evolution that demands the attention of security experts.
In...
Apple’s macOS Kernel Vulnerability Let Attackers Escalate Privileges – PoC Released
A critical vulnerability in Apple's macOS kernel (XNU), tracked as CVE-2025-24118, has been disclosed, potentially allowing attackers to escalate privileges, corrupt memory, and even execute kernel-level code.
The flaw, affecting macOS Sonoma versions earlier than...
Hackers Inject FrigidStealer Malware on Your macOS Via Fake Browser Updates
A surge in malicious web inject campaigns has introduced FrigidStealer, a new macOS-specific information stealer, deployed via fake browser update prompts.
Cybersecurity firm Proofpoint identified two previously unknown threat actors, TA2726 and TA2727, collaborating...
Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site
Cybersecurity researchers uncovered a sophisticated macOS malware campaign distributing the Poseidon Stealer through a counterfeit DeepSeek AI platform website.
This malware-as-a-service (MaaS) operation employs advanced social engineering tactics combined with anti-analysis techniques to compromise sensitive...
New macOS Vulnerability Lets Attackers Bypass Apple’s System Integrity Protection (SIP)
Microsoft Threat Intelligence has identified a significant vulnerability in macOS that could allow attackers to bypass Apple’s System Integrity Protection (SIP), a critical security mechanism designed to safeguard the operating system from malicious interference....
100 Million macOS Users At Risk – New Banshee Malware Attacks Bypassing Apple’s XProtect
Researchers analyzed new versions of the Banshee macOS Stealer sample that initially evaded detection by most antivirus engines, as analysis revealed that the malware employed a unique string encryption technique.
The encryption method was identical...
Hackers Leveraging x86-64 Binaries on Apple Silicon to Deploy macOS Malware
Advanced threat actors increasingly leverage x86-64 binaries and Apple’s Rosetta 2 translation technology to bypass execution policies and deploy malware on Apple Silicon devices.
The technique exploits architectural differences between Intel and ARM64 processors while...