/
Navigation
C
Chronicles
Browse all articles
C
E
Explore
Semantic exploration
E
R
Research
Entity momentum
R
N
Nexus
Correlations & relationships
N
~
Story Arc
Topic evolution
S
Drift Map
Semantic trajectory animation
D
P
Posts
Analysis & commentary
P
Browse
@
Entities
Companies, people, products, technologies
Domains
Browse by publication source
Handles
Browse by social media handle
Detection
?
Concept Search
Semantic similarity search
!
High Impact Stories
Top coverage by position
+
Sentiment Analysis
Positive/negative coverage
*
Anomaly Detection
Unusual coverage patterns
Analysis
vs
Rivalry Report
Compare two entities head-to-head
/\
Semantic Pivots
Narrative discontinuities
!!
Crisis Response
Event recovery patterns
Connected
Nav: C E R N
Search: /
Command: ⌘K
Embeddings: large
VOICE ARCHIVE

@jamfsoftware

@jamfsoftware
3 posts
2023-02-24
Check out our latest blog post authored by @mattbenyo on a family of #malware Jamf Threat Labs has been following that resurfaced and has been operating undetected, despite an earlier iteration being a known quantity to the #security community. https://ow.ly/...
2023-02-24 View on X
9to5Mac

Jamf finds Mac cryptomining malware in pirated copies of Final Cut Pro and warns the power of Apple Silicon Macs is making them popular cryptojacking targets

Update: Apple has now commented on the findings - see the end of the piece.  —  Cybersecurity company Jamf Threat Labs …

2021-04-27
ICYMI: Jamf's cybersecurity experts in-depth research on the malicious Shlayer macOS malware. https://ow.ly/...
2021-04-27 View on X
TechCrunch

Researcher shows that for months macOS had a flaw that would let apps run despite not being notarized by Apple's service; bug is patched in macOS Big Sur 11.3

Old malware, new tricks.  —  Apple has spent years reinforcing macOS with new security features to make it tougher for malware to break in.

2020-03-02
.@patrickwardle teaches the #RSAC crowd how to deploy repurposed #Mac #malware in an effort to go on the offensive against future attacks. #macadmins https://www.wired.com/... https://twitter.com/...
2020-03-02 View on X
Ars Technica

Researcher demos multiple ways of how to take over and repurpose allegedly state sponsored Mac malware

Former NSA hacker repackages in-the-wild Mac malware for his own use.  —  SAN FRANCISCO—Malware developers are always trying to outdo each other with creations that are stealthier ...