Skip to main content

Security

See All Stories

Mosyle uncovers new cross-platform malware undetected by antivirus tools

Mac malware safari browser extension bitcoin

After warning 9to5Mac last month about undetectable Mac malware hidden in a fake PDF converter site, Mosyle, a leader in Apple device management and security, has now uncovered a new infostealer. Dubbed ModStealer, the malware has remained invisible to all major antivirus engines since first appearing on VirusTotal nearly a month ago.

In details shared exclusively with 9to5Mac, Mosyle says ModStealer doesn’t just target macOS systems, but is cross-platform and purpose-built for one thing: stealing data.

Expand Expanding Close

Another Plex data breach sees company urge users to change their password

Another Plex data breach sees company urge users to change their password | A screen grab of the password reset page

A Plex data breach in 2022 exposed usernames, email addresses, and encrypted passwords. The company required all users to change their passwords as a precaution, and now history seems to be repeating itself.

The company is again emailing users, using virtually identical wording to describe to report a new data breach with the same data obtained …

Expand Expanding Close

Security Bite: How browsers use a psychological trick to protect millions from phishing every day

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.


If you’re reading this week’s Security Bite on your desktop, look closely at your browser’s address bar. Notice how the main (root) domain is bolder, while the rest of the URL is a lighter grey? This is not an accident, it’s a purposly implemented psychological trick called salience bias. This little design choice has protected users from phishing attacks for over a decade.

Expand Expanding Close

Hackers chained Apple and WhatsApp flaws in ‘advanced spyware campaign’

A few days ago, Apple fixed a vulnerability on iOS and macOS that “may have been exploited in an extremely sophisticated attack against specific targeted individuals.” Now, new details have emerged, and it appears that the hacking campaign also leveraged a now-fixed WhatsApp flaw to target its victims. Here are the details.

Expand Expanding Close

Security Bite: Why it’s mathematically impossible to stop malware

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.


Malware has been a persistent threat since the first virus appeared in 1982 as a prank on Apple II computers. And malware is here to stay, but not because cybercriminals and nation-states are clever (they are), but because it’s mathematically impossible to stop it.

Expand Expanding Close

Mosyle identifies new Mac malware that evades detection through fake PDF conversion tool

google chrome malware virus security dino

Mosyle, a leader in Apple device management and security, has exclusively revealed to 9to5Mac details on a new Mac malware strain, dubbed “JSCoreRunner”. The zero-day threat evaded all detections on VirusTotal at the time of discovery, spreading through a malicious PDF conversion site called fileripple[.]com to trick users into downloading what appears to be a harmless utility.

Expand Expanding Close

Most of your iCloud data isn’t fully protected – here’s how to change that

Most of your iCloud data isn’t fully protected – here’s how to change that | Low-key photo of security guard

9to5Mac is brought to you by Incogni: Protect your personal info from prying eyes. With Incogni, you can scrub your deeply sensitive information from data brokers across the web, including people search sites. Incogni limits your phone number, address, email, SSN, and more from circulating. Fight back against unwanted data brokers with a 30-day money back guarantee.

Apple uses two different forms of encryption for your iCloud data – a strong form for particularly sensitive data like the Health and Journal apps, but a weaker one for a lot of other data you still wouldn’t want falling into the wrong hands.

Fortunately the company gives you the option of switching to strong encryption for all your iCloud data, and while there are a few steps involved, it’s a worthwhile security and privacy safeguard …

Expand Expanding Close

App Store safety again called into question by Tea app

App Store safety again called into question by Tea app | Image shows a mass of red flags

Apple has frequently argued that it is reasonable for it to have monopolistic control over the sale of iPhone apps because it vets them for safety and security. This has been called into question over scam apps accepted into the App Store, and the same questions are being asked regarding the Tea app.

The so-called dating advice app has been revealed to have major security vulnerabilities, which have exposed private chats and personal data of tens of thousands of women …

Expand Expanding Close

Apple security bounties pay up to $2M, but it only paid $1k for a critical bug

Apple security bounties pay up to $2M, but it only paid $1k for a critical bug | Jar of coins shown

Apple encourages security researchers to seek out and report vulnerabilities in its devices and apps, in return for which it pays bug bounties of up to $2M.

However, one security researcher who reported a Safari vulnerability Apple graded as Critical, and gave a severity score of 9.8 out of 10, says they were paid only $1,000 …

Expand Expanding Close

Tea app security breaches reveal private chats and photo ID, as it tops App Store

Tea app security breaches reveal private chats and photo ID as it tops App Store | Code on monitor as person looks on

Two major security vulnerabilities in the Tea app – which claims to make dating safer for women – have exposed the private chats and personal data of at least tens of thousands of users.

The app, designed to allow women to share “red flags” for men they had dated, claimed four million active users after it hit the top slot in the App Store last week …

Expand Expanding Close

Here are the eight Apple security layers protecting your data

Here are the eight Apple security layers protecting your data | Partly-open MacBook with colorful reflections

9to5Mac is brought to you by Incogni: Protect your personal info from prying eyes. With Incogni, you can scrub your deeply sensitive information from data brokers across the web, including people search sites. Incogni limits your phone number, address, email, SSN, and more from circulating. Fight back against unwanted data brokers with a 30-day money back guarantee.

Apple has a reputation for prioritizing the privacy of its customers, and that commitment begins right at the chip design level.

Here’s a look at the eight layers of Apple security protecting the personal data stored on both your Apple devices and in iCloud …

Expand Expanding Close

Security Bite: Down the rabbit hole of neat, lesser-known Terminal commands (Pt. 2)

terminal app security bite

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.


I’ve recently fallen into the rabbit hole of lesser-known Terminal features. These past months, I covered everything from enabling Touch ID for sudo authentication to cleaning up public Wi-Fi connections stored on your Mac. I want to share even more neat features you probably didn’t know Terminal could do. These can be helpful if you’re an everyday Mac user or managing an enterprise fleet. Now, allow me to elevate your command-line prowess further.

Expand Expanding Close

US agency responsible for nuclear weapons was breached in Sharepoint hack [U]

More than 10,000 organizations around the world are at risk from hackers after a serious security flaw was discovered in Microsoft’s popular Sharepoint platform, used to store and share confidential documents. The majority of companies at risk are said to be in the US.

Update: Bloomberg reports that the National Nuclear Security Administration was among the organizations breached – see the end of the piece …

Expand Expanding Close

British government set to back down on secret iCloud backdoor after US pressure

British government set to back down on secret iCloud backdoor after US pressure | Image shows partly-open door

We learned earlier this year that the British government had secretly ordered Apple to create a backdoor into encrypted data for all iCloud users worldwide. Specifically, it wanted a way to see personal data protected by Apple’s introduction of Advanced Data Protection (ADP), which extended end-to-end encryption to almost all iCloud data, meaning not even the iPhone maker could access it.

Apple has been fighting the secret order in secret court hearings, but it now appears that the US government is using technology agreement negotiations to force Britain to back down …

Expand Expanding Close

Security Bite: How hackers can take over your Mac using Bluetooth

flipper zero - arin - macbook - mac - bluetooth - malware

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.


In a Bluetooth Impersonation Attack (or BIAS), hackers can exploit weaknesses in the Bluetooth protocol to impersonate a trusted device. “BOSE QC Headphones” in the Bluetooth menu could be a low-orbiting ion cannon waiting for an end-user to connect to it before unleashing all sorts of damage.

This week, I want to again share how hackers can use Flipper Zero to send sneaky keystrokes to a Mac if a victim connects to a potentially malicious Bluetooth device. This isn’t going to be a complete tutorial since there are tons of guides out there already. Instead, I want to point out how easy it is to pull this off, to make you a bit more paranoid.

Expand Expanding Close

A staggering 16 billion logins exposed in epic data breach, including Apple accounts

A staggering 16 billion logins exposed in epic data breach, including Apple accounts | Low-key photo of MacBook imagined with old-style rainbow logo

Security researchers have discovered what they describe as “one of the largest data breaches in history,” comprising a staggering 16 billion logins, which include Apple accounts (formerly known as Apple IDs).

The researchers said that the stolen data gives cybercriminals “unprecedented access to personal credentials that can be used for account takeover, identity theft, and highly targeted phishing” …

Expand Expanding Close

Security Bite: Infostealer malware spikes 28% among Mac users, says Jamf

9to5Mac security bite cybersecurity Apple

9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening & Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple.


Each year, Jamf—the popular Apple device management platform—releases its Security 360: Annual Trends Report, which gives a broad outlook of the macOS threat landscape currently facing businesses and users. The analysis uses anonymized real-world data collected from 1.4 million Macs across 90 countries with Jamf software installed.

Today, Jamf is out with its 2025 edition, which spans the previous 12 months. The report offers many shocking insights, most notably a 28% spike in infostealer malware, making it the leading Mac malware family type.

Expand Expanding Close