DigitStealer, a sophisticated info-stealer targeting Apple Silicon Macs, has had its C2 infrastructure exposed due to operator errors. Learn how this malware works and how defenders are turning the tables.
DigitStealer, a stealthy macOS infostealer, has had its secret infrastructure exposed by researchers. Learn how technical fingerprints and domain patterns are helping defenders track and block this evolving threat.
DigitStealer, a powerful new macOS infostealer, is being exposed by its own operational shortcuts. Researchers have mapped its infrastructure thanks to repeated domain and hosting choices, turning the tables on this elusive malware.
A cunning campaign exploits Claude AI, Medium, and Google Ads to infect macOS users with the MacSync malware, stealing sensitive data from thousands while hiding behind trusted platforms.
A new variant of Odyssey Stealer is sweeping across macOS systems, targeting users in over a dozen countries and outsmarting built-in Apple defenses. Here’s what you need to know to stay safe.
Odyssey Stealer is unleashing an unprecedented wave of cyberattacks against macOS users worldwide, using fake CAPTCHAs and advanced evasion techniques to steal credentials and cryptocurrency wallets. Here’s how this new threat works—and why no Mac user is safe.
GlassWorm malware infiltrated macOS systems by compromising popular OpenVSX developer extensions, stealing credentials and crypto-wallets. Discover how the attack happened and the risks to the developer ecosystem.
A stealthy new malware campaign, GlassWorm, is targeting macOS developers via tampered Open VSX extensions, stealing crypto wallets and credentials while evading detection using blockchain-powered persistence.
GlassWorm’s latest evolution weaponizes VS Code extensions to target macOS developers and their cryptocurrency wallets, using encrypted payloads, blockchain-based command-and-control, and hardware wallet trojanization for a new level of threat.
A new MacSync stealer campaign abuses Apple’s own code-signing and notarization process, bypassing Gatekeeper to infect macOS users. Here’s how this alarming tactic works—and what it means for Mac security.