APPLE

How SMBs can stop Mac malware

Some of us are old enough to remember a time when malware was strictly a Windows problem. Macs were more secure by design, but another key factor was that they were not enough to make Mac malware a smart use of attackers' time.

Macs have become very popular now. choice for both consumers and businesses, they have also become a much more attractive target for cybercriminals, and Mac malware is a real and growing problem …

Mac malware is a rapidly growing threat

Last year, 21 new Mac malware families were detected in active use, up 50% from 2022. In addition, it becomes much more dangerous in its capabilities.

For example, MacStealer is capable of extracting passwords and credit card information from your keychain. A more powerful version, Atomic macOS Stealer, can do the same, but also compromise a wide range of cryptocurrency wallets. Another example, discovered in March of this year, does the same thing: security researchers describe it as having an “alarming level of sophistication.”

One particularly dangerous form of malware is code that is capable of connecting to command and control servers and controls for loading new payloads. ObjCShellz is an example of a Mac version that attackers can remotely update to provide new capabilities.

Cybercriminals have also gotten better at bypassing the security protections Apple has built into macOS.

Small amplifier; medium-sized businesses are at particular risk

Small & Medium-sized businesses (SMBs) are a particularly attractive target for cybercriminals because they offer much greater financial benefit than consumers, but are typically a much softer target than enterprise-level businesses.

Hunttress is a company. Founded by former NSA cyber operators with one simple goal: to provide small and medium-sized businesses with the same sophisticated threat protection previously only available to enterprise companies.

Register now for this free webinar

The company invites you to a webinar full of information about hidden threats, strategies and solutions you can use to protect yourself your MacOS systems. It will debunk myths about macOS security and provide reliable information and practical steps you can take to protect the Macs you use in your business.

  • The lightning speed of macOS threats and the hackers behind them.
  • Why relying solely on built-in macOS security is a risky bet
  • Real incidents , the victims of which were unsuspecting companies.
  • How to distinguish real cybersecurity solutions from fakes.
  • Practical strategies to combat the growing threats to macOS and stop hackers in their tracks.
  • >

Register now for a free seat at the webinar on May 23.

  • p>

    Photo: Hostaphoto on Unsplash

  • Leave a Reply