logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Millions of PC motherboards were sold with a firmware backdoor
  • Microsoft Details Critical Apple macOS Vulnerability Allowing SIP Protection Bypass
  • Evolving Threat Landscape of Hacktivism in Colombia
  • Alert: Hackers Exploit Barracuda Email Security Gateway 0-Day Flaw for 7 Months
  • The Transformative Power of Artificial Intelligence in Healthcare

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-2962 (faculty_evaluation_system) 29 May 2023
  • CVE-2023-2955 (students_online_internship_timesheet_system) 29 May 2023
  • CVE-2023-24600 (ox_app_suite) 29 May 2023
  • CVE-2023-24601 (ox_app_suite) 29 May 2023
  • CVE-2023-24602 (ox_app_suite) 29 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Experts spotted a new variant of UpdateAgent macOS malware dropper written in Swift

Posted on 18 May 2022

From securityaffairs.co

UpdateAgent

Researchers spotted a new variant of the UpdateAgent macOS malware dropper that was employed in attacks in the wild. Researchers from the Jamf Threat Labs team have uncovered a new variant of the UpdateAgent macOS malware dropper. The new version…

Read more…

Posted in News

Post navigation

Previous post: Microsoft Warns of “Cryware” Info-Stealing Malware Targeting Crypto Wallets
Next post: WordPress: Millions of attacks target the Tatsu Builder plugin
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.