Nov. 6, 2023, 10:53 p.m. | SC Staff

SC Magazine feed for Strategy www.scmagazine.com

Threat actors could leverage Apple's "Find My" location network used for locating lost Apple devices to facilitate the exfiltration of keylogger-stored information, BleepingComputer reports.

apple bleepingcomputer devices endpointdevice-security exfiltration exploitation find find my information keylogger location lost network password reports theft threat threat actors

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)