• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
macos malware: myth vs. truth – podcast

MacOS Malware: Myth vs. Truth – Podcast

You are here: Home / Latest Cyber Security Vulnerabilities / MacOS Malware: Myth vs. Truth – Podcast
April 7, 2022

Huntress Labs R&D Director Jamie Levy busts the previous “Macs really don’t get viruses” fantasy and provides tips on how MacOS malware differs and how to guard against it.

Bear in mind individuals adverts with a sneezing man in a match who suggests he’s a Personal computer and to keep away, he’s received that unpleasant virus that’s likely all around? “That’s Alright,” states the younger, hip person in blue jeans: He’s a Mac.

… as if any device that runs code could quite possibly be immune to malware…?

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Boy, was that a stretch.

The untruthiness of the notion that Macs are immune to malware has been proved by various MacOS-focused malwares. Examples include things like Silver Sparrow, the malware able of targeting Apple’s then-new M1 ARM architecture Macs back in February 2021. One more: the variant of the Shlayer Mac OSX malware with highly developed stealth abilities that was noticed in the wild in June 2020, actively employing poisoned Google look for final results in purchase to come across victims.

Do you nonetheless listen to persons say “Oh, I’m on a Mac. I can’t get a virus”?

Jamie Levy, director of R&D at Huntress, just lately hosted one particular of the company’s “Tradecraft Tuesday” webinars, in which she dug into the danger landscape on the MacOS facet of the aisle to consider a seem at which threats are the most unsafe. If you’re however hearing Mac customers swear they are invulnerable, this is the podcast to listen to. … or to get them to listen to.

She dropped by the Threatpost podcast to provide us the highlights of that webinar, including:

  • What malware appears like on MacOS
  • How persistence operates on MacOS, and what it indicates for victims and
  • The severity of the standard threats that prey upon MacOS buyers, and how defenders can guard their consumers and environments from all those threats.

You should see under for a record of MacOS security equipment that Jamie outlined in the exhibit.

You can download the podcast under or hear listed here. For more podcasts, look at out Threatpost’s podcast internet site.

Instruments to Guard MacOS

These are the applications to guard MacOS that Jamie proposed all through the podcast:

  • Apple’s Gatekeeper, Notarization, and XProtect: Change on Apple’s individual MacOS resources to recognize and block malware.
  • Lulu: A free, open firewall for Macs from Objective-See that Jamie recommends as a supplement to the default firewall in MacOS.
  • Little Snitch: A host-based application firewall for macOS from Aim Advancement Application GmbH, Little Snitch can be utilized to watch apps, blocking or permitting them to link to hooked up networks by means of advanced procedures. Jamie mentioned it’s generally like Lulu, except “maybe it is a tiny a lot more extended.”
  • RansomWhere: A tool from Aim-See that regularly screens the file procedure for the generation of encrypted information by suspicious procedures in buy to protect personalized files from ransomware.
  • BlockBlock: An additional software from Objective-See, BlockBlock displays widespread persistence spots and alerts each time a persistent part is added.

Transferring to the cloud? Find out rising cloud-security threats along with solid tips for how to protect your belongings with our Cost-free downloadable Book, “Cloud Security: The Forecast for 2022.” We investigate organizations’ top dangers and problems, very best tactics for defense, and assistance for security results in these types of a dynamic computing natural environment, which includes helpful checklists.


Some areas of this report are sourced from:
threatpost.com

Previous Post: «into the breach: breaking down 3 saas app cyber attacks Into the Breach: Breaking Down 3 SaaS App Cyber Attacks in 2022
Next Post: #ISC2Events: A DPO’s Guide to Delivering a Cybersecurity Awareness Program Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.