ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers

Three different ClickFix campaigns have been found to act as a delivery vector for the deployment of a macOS information stealer called MacSync.
“Unlike traditional exploit-based attacks, this method relies entirely on user interaction – usually in the… Continue reading ClickFix Campaigns Spread MacSync macOS Infostealer via Fake AI Tool Installers

Posted in Uncategorized

Microsoft Edge 146 adds IP privacy and local network access controls

Microsoft Edge version 146 (Stable) became available on March 13, 2026, bringing updates to tracking protection, IP privacy, and enterprise network security policies. One change affects tracking prevention in InPrivate browsing. InPrivate windows use t… Continue reading Microsoft Edge 146 adds IP privacy and local network access controls

Washington is right: Cybercrime is organized crime. Now we need to shut down the business model

The executive order finally calls cyber-enabled fraud what it is: transnational organized crime. Now the U.S. has to act like it—and the private sector has to stop settling for defense-only while the criminal infrastructure stays intact.

The post Washington is right: Cybercrime is organized crime. Now we need to shut down the business model appeared first on CyberScoop.

Continue reading Washington is right: Cybercrime is organized crime. Now we need to shut down the business model

Attackers are exploiting AI faster than defenders can keep up, new report warns

Cybersecurity is entering “a new phase” as artificial intelligence tools have matured and given IT defenders significantly less time to respond to cyberattacks and other threats, according to a new report released Monday. The report, authored by federal contractor Booz Allen Hamilton, concludes that threat actors have adopted AI more quickly than governments and private […]

The post Attackers are exploiting AI faster than defenders can keep up, new report warns appeared first on CyberScoop.

Continue reading Attackers are exploiting AI faster than defenders can keep up, new report warns