Threat Intelligence Uncovering Apple Vulnerabilities: The diskarbitrationd and storagekitd Audit Story Part 1 Csaba Fitzl Nov 8, 2024 34 min read
Threat Intelligence It’s About The Journey: Fake Cloudflare Authenticator Adam Kohler & Christopher Lopez Oct 24, 2024 34 min read
Threat Intelligence TodoSwift Disguises Malware Download Behind Bitcoin PDF Christopher Lopez Aug 16, 2024 29 min read
Threat Intelligence InfoStealer Uses SwiftUI, OpenDirectory API to Capture Passwords Christopher Lopez Aug 8, 2024 20 min read
Threat Intelligence Dock Tile Plugins Could Be Used to Escalate Privileges Csaba Fitzl Jul 19, 2024 7 min read
Threat Intelligence How Twitch Helper Can Be Used for Privilege Escalation Christopher Lopez Jun 12, 2024 11 min read
Threat Intelligence Update: Cuckoo Malware Evolves Adam Kohler & Christopher Lopez May 29, 2024 8 min read
Threat Intelligence How Malware Can Bypass Transparency Consent and Control (CVE-2023-40424) Csaba Fitzl May 22, 2024 14 min read
Threat Intelligence Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware Adam Kohler & Christopher Lopez Apr 30, 2024 43 min read
Threat Intelligence CloudChat Infostealer: How It Works, What It Does Adam Kohler & Christopher Lopez Apr 8, 2024 17 min read
Threat Intelligence How Apple Mitigates Vulnerabilities in Installer Scripts Csaba Fitzl Mar 15, 2024 21 min read