The latest bypass for Apple's application-safety feature could allow malicious takeover of Macs.
Follow Dark Reading:
 December 21, 2022
LATEST SECURITY NEWS & COMMENTARY
Microsoft Warns on 'Achilles' macOS Gatekeeper Bypass
The latest bypass for Apple's application-safety feature could allow malicious takeover of Macs.
AWS Elastic IP Transfer Feature Gives Cyberattackers Free Range
Threat actors can take over victims' cloud accounts to steal data, or use them for command-and-control for phishing attacks, denial of service, or other cyberattacks.
'Blindside' Attack Subverts EDR Platforms From Windows Kernel
The technique loads a nonmonitored and unhooked DLL, and leverages debug techniques that could allow for running arbitrary code.
Raspberry Robin Worm Targets Telcos & Governments
With 10 layers of obfuscation and fake payloads, the Raspberry Robin worm is nesting its way deep into organizations.
NATO-Member Oil Refinery Targeted in Russian APT Blitz Against Ukraine
Security Service-backed Trident Ursa APT group shakes up tactics in its relentless cyberattacks against Ukraine.
Protecting Hospital Networks From 'Code Dark' Scenarios
Asset inventory, behavioral baselining, and automated response are all key to keeping patients healthy and safe.  
Coming to a SOC Near You: New Browsers, 'Posture' Management, Virtual Assistants
Startups are coalescing around effective data loss prevention, reducing data attack surfaces, and viable AI automation.
(Sponsored Article) Threat Intelligence Through Web Scraping
Bright Data CEO Or Lenchner discusses how security teams are utilizing public Web data networks to safeguard their organizations from digital risks.
MORE NEWS / MORE COMMENTARY
HOT TOPICS
Holiday Spam, Phishing Campaigns Challenge Retailers
Revived levels of holiday spending have caught the eye of threat actors who exploit consumer behaviors and prey on the surge of online payments and digital activities during the holidays.

Rethinking Risk After the FTX Debacle
Risk is no longer a single entity, but rather an interconnected web of resources, assets, and users.

Time to Get Kids Hacking: Our 2022 Holiday Gift Guide
Check out our slideshow of 10 fun games and toys that teach programming principles, electronics, and engineering concepts to get kids ready to hack the planet.

MORE
EDITORS' CHOICE
Malicious Python Trojan Impersonates SentinelOne Security Client
A fully functional SentinelOne client is actually a Trojan horse that hides malicious code within; it was found lurking in the Python Package Index repository ecosystem.
LATEST FROM THE EDGE

Give Yourself the Gift of Secure Holiday E-Commerce
Automating your defenses can bring good tidings of great joy.
LATEST FROM DR TECHNOLOGY

How AI/ML Can Thwart DDoS Attacks
When properly designed and trained, artificial intelligence and machine learning can help improve the accuracy of distributed denial-of-service detection and mitigation.
WEBINARS
View More Dark Reading Webinars >>
WHITE PAPERS
FEATURED REPORTS
View More Dark Reading Reports >>
PRODUCTS & RELEASES
CURRENT ISSUE
DOWNLOAD THIS ISSUE
VIEW BACK ISSUES
Dark Reading Daily
-- Published By Dark Reading
Informa Tech Holdings LLC | Registered in the United States
with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
To opt-out of any future Dark Reading Daily Newsletter emails, please respond here.
Thoughts about this newsletter? Give us feedback.
Keep This Newsletter Out Of Your SPAM Folder
Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list:
If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation.
We take your privacy very seriously. Please review our Privacy Statement.