Apple devices are popular in business settings for their reliability and security, but managing a fleet of Macs, iPads, and iPhones can be challenging. IT teams need the right strategies to track devices, enforce security policies, and streamline updates. In this blog, we’ll cover essential tools you should use to simplify oversight and control. Apple […]
Category Archives: Apple
Apple will no longer offer iCloud end-to-end encryption in the United Kingdom after the government requested a backdoor to access Apple customers’ encrypted cloud data. […] Go to Source Author: Sergiu Gatlan
The FakeUpdate malware campaigns are increasingly becoming muddled, with two additional cybercrime groups tracked as TA2726 and TA2727, running campaigns that push a new macOS infostealer malware called FrigidStealer. […] Go to Source Author: Bill Toulas
A new variant of the XCSSET macOS modular malware has emerged in attacks that target users’ sensitive information, including digital wallets and data from the legitimate Notes app. […] Go to Source Author: Bill Toulas
Apple has released emergency security updates to patch a zero-day vulnerability that the company says was exploited in targeted and “extremely sophisticated” attacks. […] Go to Source Author: Sergiu Gatlan
The first Apple-notarized porn app, “Hot Tub,” is now available to iPhone users in Europe through the alternative app marketplace, AltStore PAL. […] Go to Source Author: Lawrence Abrams
A team of security researchers has disclosed new side-channel vulnerabilities in modern Apple processors that could steal sensitive information from web browsers. […] Go to Source Author: Bill Toulas
Apple has released security updates to fix this year’s first zero-day vulnerability, tagged as actively exploited in attacks targeting iPhone users. […] Go to Source Author: Sergiu Gatlan
Hackers are once again abusing Google ads to spread malware, using a fake Homebrew website to infect Macs and Linux devices with an infostealer that steals credentials, browser data, and cryptocurrency wallets. […] Go to Source Author: Bill Toulas
Apple recently addressed a macOS vulnerability that allows attackers to bypass System Integrity Protection (SIP) and install malicious kernel drivers by loading third-party kernel extensions. […] Go to Source Author: Sergiu Gatlan

