Backups vulnerable

Backups of all your important information and systems, resilient to attack, is an essential part of any incident response and business continuity plan. So anything that could impact that back-up must be a priority to solve. So if you use Veeam back-up you need a conversation: Hackers target vulnerable Veeam …

Malware Stealing information from Apple’s Keychain

For a subscription of $1000 per month, Malware-as-a-Service is available to hackers via a Telegram channel that attacks Apple’s keychain password security on MacOS. The malware, called Atomic or AMOS, once deployed attempts to steal and exfiltrate a range information from MacOS machines, including passwords, cookies, crypto-wallets, browsers etc.. New …