“`html
Check Point Research has identified a new version of the Banshee macOS stealer malware, which has been evading detection since September 2024. The malware targets macOS users, stealing sensitive information and utilizing an encryption algorithm similar to Apple’s XProtect. Despite the shutdown of its original operations after a code leak, Banshee continues to be distributed through phishing websites and malicious GitHub repositories.…Tag: APPLE
Threat Actor: N/A | N/A Victim: iPhone owners | iPhone owners
Key Point :
Apple confirms that Siri data has never been used for marketing profiles or advertising.…Threat Actor: Unknown | unknown Victim: GFI KerioControl users | GFI KerioControl
Key Point :
The vulnerability allows attackers to perform HTTP response splitting, leading to reflected cross-site scripting (XSS) and RCE.…Keypoints :
Multiple vulnerabilities discovered in Ivanti products. Most severe vulnerability allows for remote code execution.…Threat Actor: John Binns | John Binns Victim: T-Mobile | T-Mobile
Key Point :
The 2021 breach affected over 76.6 million individuals, including more than 2 million Washington residents.…The video discusses a new vulnerability that was revealed in the Common Unix Printing System (CUPS), particularly affecting network printers on Linux systems. Alex Lyn joins Darren Kitchen to explore this remote code execution (RCE) exploit and demonstrate some of its implications, including how malicious printers can potentially compromise systems on the same network.…
Threat Actor: Flax Typhoon (Chinese state-sponsored) | Flax Typhoon Victim: Cyberhaven | Cyberhaven
Key Point :
Dozens of Google Chrome extensions were found stealing sensitive data from 2.6 million devices.…Threat Actor: Unknown | FireScam Victim: Android users | Telegram
Key Point :
FireScam is delivered via a dropper module that installs the main malware payload while evading detection.…Threat Actor: Unprivileged attackers | unprivileged attackers Victim: macOS users | macOS users
Key Point :
SysBumps exploits speculative execution vulnerabilities in macOS system calls.…Keypoints :
Multiple critical vulnerabilities identified across various software products.…Threat Actor: Shadowserver | Shadowserver Victim: Mail Server Operators | mail server operators
Key Point :
3.3 million hosts are running POP3/IMAP services without TLS, exposing usernames and passwords in plain text.…Threat Actor: Apple Inc. | Apple Inc. Victim: Mobile device owners | mobile device owners
Key Point :
Settlement covers the period from Sept.…Threat Actor: Apple Inc. | Apple Victim: Users of Siri-enabled devices | Siri users
Key Point :
Settlement covers all U.S.…Summary: Apple has agreed to a $95 million settlement in a class action lawsuit over privacy violations related to its Siri voice assistant. The lawsuit accused Apple of improperly collecting and sharing users’ private voice communications without consent.
Threat Actor: Apple Inc.…
Summary: Apple has agreed to a $95 million settlement over allegations that Siri was used to eavesdrop on users without their consent. The lawsuit claims that recordings were made even when Siri was not activated, contradicting Apple’s privacy commitments.
Threat Actor: Apple Inc.…