Beguiling Apple with Malicious Code

3-13-6

Nefarious actors who successfully exploit a newly discovered vulnerability in Apple code signing can potentially deceive third-party tools into believing their code is Apple approved. Today, the Okta Research and Exploitation (REX) researcher who uncovered the security issue publicly disclosed the vulnerability that could allow threat actors to bypass a core security function to impersonate Apple.

Click here to view original webpage at www.infosecurity-magazine.com

Categories:

Your e-mail address will not be published.
Required fields are marked*