Hacker News
- Analyzing a watering hole campaign using macOS exploits https://blog.google/threat-analysis-group/analyzing-watering-hole-campaign-using-macos-exploits/ 2 comments
Linking pages
- PSA: Apple isn’t actually patching all the security holes in older versions of macOS | Ars Technica https://arstechnica.com/gadgets/2021/11/psa-apple-isnt-actually-patching-all-the-security-holes-in-older-versions-of-macos/ 294 comments
- Hackers Targeted Apple Devices in Hong Kong for Widespread Attack | WIRED https://www.wired.com/story/ios-macos-hacks-hong-kong-watering-hole/ 54 comments
- New Mac malware raises more questions about Apple's security patching https://blog.malwarebytes.com/malwarebytes-news/2021/11/new-mac-malware-raises-more-questions-about-apples-security-patching/ 6 comments
- Mac and Windows users infected by software updates delivered over hacked ISP | Ars Technica https://arstechnica.com/security/2024/08/hacked-isp-infects-users-receiving-unsecure-software-updates/ 5 comments
- Booby-trapped sites delivered potent new backdoor trojan to macOS users | Ars Technica https://arstechnica.com/information-technology/2022/01/booby-trapped-sites-delivered-potent-new-backdoor-trojan-to-macos-users/ 3 comments
- Protecting Android users from 0-Day attacks https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/ 0 comments
- StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms | Volexity https://www.volexity.com/blog/2024/08/02/stormbamboo-compromises-isp-to-abuse-insecure-software-update-mechanisms/ 0 comments
Linked pages
- Safe Browsing â Google Safe Browsing https://safebrowsing.google.com/ 8 comments
- The Ultimate Disassembly Framework – Capstone – The Ultimate Disassembler http://www.capstone-engine.org/ 8 comments
- How we protect users from 0-day attacks https://blog.google/threat-analysis-group/how-we-protect-users-0-day-attacks/ 0 comments
Related searches:
Search whole site: site:blog.google
Search title: Analyzing a watering hole campaign using macOS exploits
See how to search.