• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Cyber Threat Defense

Cyber Security News

MacOS

OceanLotus Uses Malware to Attack MacOS Systems

April 20, 2018 By News Team Leave a Comment

A new backdoor has been discovered by researchers at Trend Micro, which attacks MacOS systems, and is likely linked to the OceanLotus threat group. The cybersecurity firm, in a recent blog post, said the backdoor it dubbed OSX_OCEANLOTUS.D, … [Read more...] about OceanLotus Uses Malware to Attack MacOS Systems

Filed Under: Uncategorized Tagged With: APT, backdoor, C&C, Cambodia, dropper, HDMC, Laos, MacOS, OceanLotus, Perl, Philippines, Trend Micro, Vietnam, Vietnam-based APT group, Volexity

MacOS Kernel Exploit Leads to Root Access

January 5, 2018 By News Team Leave a Comment

On New Year’s Eve, a researcher going by “Siguza” released details of a MacOS kernel exploit that dates back to 2002. A successful attack could offer adversaries complete root access to targeted systems. Siguza (“a hobbyist hacker”) announced the … [Read more...] about MacOS Kernel Exploit Leads to Root Access

Filed Under: Hacking, Vulnerabilities Tagged With: Bugcrowd, hack, IOHIDFamily, MacOS, MacOS kernel exploit, Siguza, Zero Day Initiative

Primary Sidebar

Recent Articles

  • How Profits Inspires Virus Developers
  • What’s Propelling A10 Networks Inc (NYSE: ATEN) After Higher Shorts Reported?
  • FacexWorm Targets Facebook Messenger
  • Cisco Systems Webex Flaws Allows Remote Users To Execute Code
  • Europe sees Radical Drop in DDoS Attacks Since Seizure of Webstresser Site

Categories

  • Application Security
  • Bitcoin
  • Bot Defense
  • Browser Security
  • Business Models
  • Critical infrastructure
  • Cryptocurrencies
  • Cryptojacking
  • Cryptomining
  • Cybercrime
  • cybersecurity
  • Data Breach
  • Data Theft
  • DDoS
  • Endpoint Security
  • Espionage
  • Feature
  • Firewall
  • Fraud
  • Government
  • Hacking
  • Hacking Tools
  • IoT
  • Layer7
  • Leaks
  • Malware
  • Mining
  • Mobile security
  • Point of Sale Devices
  • Quantum Encryption
  • Quantum Security
  • Ransomware
  • Routing
  • Uncategorized
  • Vault7
  • Vault8
  • Vulnerabilities
  • Wikileaks

Secondary Sidebar

Cyber Threat Defense.net | Copyright © 2019 All product names, logos, and brands are property of their respective owners. All company, product and service names used on site are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.