![]() ![]() ![]() This campaign was using two macOS vulnerabilities to infect Macs that simply visited the wrong web page.Ī watering hole attack is one that’s deployed through a website that the desired target is likely to visit, so named because of the way predators will hide near a watering hole that is frequented by their prey. Google’s Threat Analysis Group (TAG) discovered a watering hole campaign in Hong Kong, targeting journalists and pro-democracy political groups. Watering hole campaign discovered by Google And new Mac malware that was disclosed on Thursday provides a concrete example of why this is not just theory. ![]() In theory, this could lead to attacks on those vulnerable systems. Often, systems older than the most current one were left in vulnerable states. His findings showed a shocking number of cases where Apple patched a vulnerability, but did not do so in all of the vulnerable system versions. As mentioned in some of our previous coverage, security researcher Joshua Long recently shone a light on problems with Apple’s security patching strategy. Apple’s reputation on security has been taking a beating lately.
0 Comments
Leave a Reply. |