Kategorie
JDownloader site hacked to replace installers with Python RAT malware
Fake OpenAI repository on Hugging Face pushes infostealer malware
cPanel, WHM Release Fixes for Three New Vulnerabilities — Patch Now
Chaos erupts as cyberattack disrupts learning platform Canvas amid finals
Chaos erupted at schools and colleges throughout the US on Thursday as a cyberattack disrupted online learning platform Canvas just as students were due to take final exams.
Canvas parent company Instructure said that as of Friday morning, the platform was back online. Instructure said it temporarily took Canvas offline on Thursday after identifying unauthorized activity in its network. The threat actor was the same one responsible for a data breach that Instructure disclosed a week ago. Data accessed included user names, email addresses, student ID numbers, and messages exchanged on the platform. The company said it has no indication that passwords, dates of birth, government identifiers, or financial information were involved.
Schools and colleges scrambleA ransomware group known as ShinyHunters claimed responsibility for the breach on its dark web site. It claimed the data it took came from 275 million people associated with 8,800 schools.
TCLBANKER Banking Trojan Targets Financial Platforms via WhatsApp and Outlook Worms
NVIDIA confirms GeForce NOW data breach affecting Armenian users
Fake Call History Apps Stole Payments From Users After 7.3 Million Play Store Downloads
Linux Attackers Abuse Admin Tools For Stealthy Intrusions
Why More Analysts Won’t Solve Your SOC’s Alert Problem
One Click, Total Shutdown: The "Patient Zero" Webinar on Killing Stealth Breaches
Ubuntu Dirty Frag Important Local Privilege Escalation Exploit
Apple vs. social engineering: Terminal paste trap blocked
Echoing concerns from other security experts, Orange Cyberdefense (OC) recently warned that employees have become the biggest security threat faced by business.
Now, in the latest illustration of its ongoing security response, Apple is putting new protections in place in macOS 26.4 that should help – but employee education remains critical as hackers turn to complex, multi-stage, social engineering attacks to infest systems with malware.
Your people are your weaknessThe data tells its own story. OC explains: Employees account for 57% of all security incidents and 45% of these incidents come when workers bypass or ignore security policies by, for example, using unapproved tools.
Attackers are actively searching for and exploiting those kinds of policy workarounds, seeking weaknesses in commonly used, but unapproved, tools. Users really should educate themselves.
While companies can put some mitigations in place using device management and policy controls to constrain app use and downloads across their endpoints, Apple is also working to keep systems secure with a focus on the Terminal app.
Terminal’s early warning systemIn this case, it will introduce new malware warnings and protections to help prevent people from using Terminal to override system security to install malware-laden scripts. That’s the attack vector currently being used in the ClickFix series of attacks, which use fake macOS utilities to trick Mac users into doing just that.
It’s yet another example of how attackers rely on complex social engineering attacks to fool targets into undermining their own security. These attacks often begin with an attempt to get users to install infostealer malware on their own machines, and run them, bypassing Mac’s native malware defence.
Apple already has many, many protections to help combat attacks like these; now, we’ll see warnings in macOS Tahoe 26.4 whenever a relatively novice user pastes anything into the Terminal. Apple’s XProtect continues to block known malicious scripts.
Helping people make better decisionsThese warnings don’t appear in the first 24 hours after setting up a Mac, nor do they appear if a user has developer tools such as Xcode installed. That’s because Apple assumes developers are savvy enough to avoid falling for such tricks, while many users setting up their Macs may have legitimate need to use Terminal for legitimate purposes. (Apple will always warn when you try to paste code from sources known to be malicious.)
To an extent, Apple’s new protection reflects its belief that users should have choice while ensuring they are informed. Figuring out when to warn a user of the dangers they take has always been a challenge, as you don’t want to interfere in the user experience too heavily. But the prevalence of the kinds of threats OC warns about pushed Apple to put a new gate in place.
FileVault keys come to the Passwords appThis isn’t the only new protection Apple has planned for macOS 26.4. The update does something many have long wanted. Ever since Apple’s first M-series chips arrived, we’ve had situations in which users forget their FileVault key, which can lead to Macs getting bricked when sold. Apple has now moved the macOS FileVault recovery key into users’ end-to-end encrypted Passwords app.
That’s good in two ways: it removes the threat Apple could lose or leak the key and makes it easier for a user to recover that key using the Passwords app on anther device. When you protect the data on your Mac with FileVault, you get a recovery key during set-up. If you forget the password for your Mac, you can reset the password by entering the recovery key.
Finally, IT admins seeking to ensure compliance with security policies will appreciate that Apple began rolling out Background Security Improvements in iOS 26.3.1, iPadOS 26.3.1 and macOS 26.3.1 to deliver incremental fixes and additional protections in between normal software updates. Still, as the OC data shows, the best and most effective security (beyond moving to a Mac) is to ensure employees fully understand the implications and significance of your company’s current security policies.
Please follow me on social media! Join me on BlueSky, LinkedIn, and Mastodon.
Trellix source code breach claimed by RansomHouse hackers
CISA gives feds four days to patch Ivanti flaw exploited as zero-day
Quasar Linux RAT Steals Developer Credentials for Software Supply Chain Compromise
Zara data breach exposed personal information of 197,000 people
One Missed Threat Per Week: What 25M Alerts Reveal About Low-Severity Risk
Former govt contractor convicted for wiping dozens of federal databases
New Linux PamDOORa Backdoor Uses PAM Modules to Steal SSH Credentials
Linux Firewall Rules Management Challenges Kubernetes Security
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- …
- následující ›
- poslední »



