|
You are here |
malgregator.com | ||
| | | | |
reverse.put.as
|
|
| | | | | Today a local privilege escalation vulnerability was disclosed in this blog post. It describes a vulnerability in IOBluetoothFamily kernel extension (IOKit is a never-ending hole of security vulnerabilities). Mavericks and most probably all previous versions are vulnerable but not Yosemite. The reason for this is that Apple silently patched the bug in Yosemite. This is not a new practice, where Apple patches bugs in the latest and newly released OS X version and doesn't care about older versions. | |
| | | | |
blog.polyswarm.io
|
|
| | | | | CastleLoader, a versatile malware loader, has infected 469 devices since May 2025, leveraging Cloudflare-themed ClickFix phishing and fake GitHub repositories to deliver information stealers and RATs. | |
| | | | |
theevilbit.github.io
|
|
| | | | | Intro Link to heading The Kandji team is always looking out for how to help keep your devices secure. In line with that, our Threat Research team performed an audit on the macOS diskarbitrationd and storagekitd system daemons, uncovering several vulnerabilities such as sandbox escapes, local privilege escalations, and TCC bypasses. Our team reported all of them to Apple through their responsible disclosure program, and as these are fixed now, we are releasing the details. | |
| | | | |
claroty.com
|
|
| | | Claroty researchers have discovered multiple vulnerabilities in popular industrial VPN-based solutions that provide remote access. Learn more. | ||