|
You are here |
objective-see.com | ||
| | | | |
pewpewthespells.com
|
|
| | | | | ||
| | | | |
www.jviotti.com
|
|
| | | | | This article describes how to build iOS applications using Objective-C with CMake instead of plain Xcode | |
| | | | |
objective-see.org
|
|
| | | | | [AI summary] The provided text outlines various macOS malware campaigns and attacks, including backdoors, supply chain compromises, and multi-stage attacks. Key points include: 1. **RustBucket and BlueNoroff APTs**: These groups have been targeting macOS with backdoors like ObjCShellz, which are written in Objective-C and Swift, respectively. These malware variants communicate with C2 servers to download and execute payloads. 2. **JumpCloud Supply Chain Attack**: DPRK attributed attackers compromised JumpCloud, a zero-trust directory platform, leading to a supply chain attack that affected its customers. The attack involved spear-phishing and deploying payloads like FullHouse.Doored, StratoFear, and TieDye. 3. **Mandiant's Analysis**: Mandiant detailed th... | |
| | | | |
www.aymericlamboley.fr
|
|
| | | [AI summary] A blog post explains how to install an iOS app directly from a URL using a plist file and a QR code, bypassing the need for third-party services like TestFlight. | ||