May 31, 2023, 9:13 a.m. | Livia Gyongyoși

Heimdal Security Blog heimdalsecurity.com

Researchers discovered an Apple vulnerability that threat actors can use to deploy undeletable malware. In order to exploit CVE-2023-32369, hackers need to previously gain root privileges over the device. The Apple bug enables them to bypass System Integrity Protection (SIP) and access the victim`s private data by evading Transparency, Consent, and Control (TCC) security checks. […]


The post MacOS Vulnerability Enables Hackers to Bypass SIP Root Restrictions appeared first on Heimdal Security Blog.

access apple apple vulnerability bug bypass consent cve cve-2023-32369 cybersecurity news data device exploit hackers integrity macos macos vulnerability malware order private private data privileges protection researchers restrictions root sip system threat threat actors transparency victim vulnerability

Information Security Cyber Risk Analyst

@ Intel | USA - AZ - Chandler

Senior Cloud Security Engineer (Fullstack)

@ Grab | Petaling Jaya, Malaysia

Principal Product Security Engineer

@ Oracle | United States

Cybersecurity Strategy Director

@ Proofpoint | Sunnyvale, CA

Information Security Consultant/Auditor

@ Devoteam | Lisboa, Portugal

IT Security Engineer til Netcompany IT Services

@ Netcompany | Copenhagen, Denmark