Latest security news
- ClickFix campaign delivers Mac malware via fake Apple page
- Just Three Ransomware Gangs Accounted for 40% of Attacks Last Month
- Poisoned “Office 365” search results lead to stolen paychecks
- Google Chrome Rolls Out Protection Against Infostealers Targeting Session Cookies
- Gmail’s end-to-end encryption comes to mobile, no extra apps required
- To counter cookie theft, Chrome ships device-bound session credentials
- Little Snitch for Linux shows what your apps are connecting to
- April 2026 Patch Tuesday forecast: Spring-cleaning of a preview
- What vibe hunting gets right about AI threat hunting, and where it breaks down
- Health insurance lead sites sell personal data within seconds of form submission
- Product showcase: Session, a messenger without phone numbers or metadata
- STX RAT Targets Finance Sector With Advanced Stealth Tactics
- Bitcoin Depot Reports $3.6m Crypto Theft After System Breach
- Atomic Stealer MacOS ClickFix Attack Bypasses Apple Security Warnings
- Middle East Hack-for-Hire Operation Traced to South Asian Cyber Espionage Group
- Governance Gaps Emerge as AI Agents Drive 76% Increase in NHIs
- Google Warns of New Threat Group Targeting BPOs and Helpdesks
- Google API Keys Quietly Gain Access to Gemini on Android Devices
- Critical Vulnerability in Ninja Forms Exposes WordPress Sites
- Anthropic Launches Project Glasswing to Use AI to Find and Fix Critical Software Vulnerabilities
- US Thwarts DNS Hijacking Network Controlled by Russian APT28 Hackers
- Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years
- Iran‑Backed Threat Actors Hit US CNI Providers via Internet‑Facing OT Assets
- GPU Rowhammer Attack Enables Privilege Escalation and Full System Compromise
Security researchers at Jamf have uncovered a new ClickFix-style attack targeting Mac users via a fake Apple-themed webpage offering instructions on how to “reclaim disk space on your Mac”. The malicious page (Source: Jamf) ClickFix for everybody ClickFix is a social engineering technique that cons victims into running malicious commands on their own machine, usually by pretending the commands are needed to fix a problem or perform routine upkeep. This technique was initially aimed at …
(C) Do-Know.com (http://do-know.com/). Do not copy without permission from info at do-know.com.