Event JSON
{
"id": "8394b4d1ea143bc5ee76f4734b8aa82ce6e903e2cdde906183eaa6136237c20b",
"pubkey": "30ff1514a2751188e32f14cb897eba2f52c39fc69663d35793db304db7477da6",
"created_at": 1729200301,
"kind": 1,
"tags": [
[
"d",
"05e4461a-5ca4-4698-8b69-cbca594f3c95"
],
[
"subject",
"Security Bite: Hackers are now directing users to Terminal to bypass Gatekeeper in macOS Sequoia"
],
[
"r",
"https://9to5mac.com/2024/10/17/security-bite-hackers-are-now-directing-users-to-terminal-to-bypass-gatekeeper-in-macos-sequoia/"
],
[
"snaid",
"a3b2ca05-8a7b-42ed-a395-64b7e60fb9a6"
],
[
"published_at",
"1729200013"
],
[
"p",
"30ff1514a2751188e32f14cb897eba2f52c39fc69663d35793db304db7477da6"
],
[
"imeta",
"url https://i0.wp.com/9to5mac.com/wp-content/uploads/sites/6/2024/10/macos-sequoia-bypass-hackers.png?resize=1200%2C628\u0026quality=82\u0026strip=all\u0026ssl=1",
"alt Article image"
],
[
"p",
"5f7bc57f61a88f5c2728ac4576686198b2d761785d46ca59bb9af4ac31f59f91"
]
],
"content": "Security Bite: Hackers are now directing users to Terminal to bypass Gatekeeper in macOS Sequoia\nhttps://i0.wp.com/9to5mac.com/wp-content/uploads/sites/6/2024/10/macos-sequoia-bypass-hackers.png?resize=1200%2C628\u0026quality=82\u0026strip=all\u0026ssl=1\n\n9to5Mac Security Bite is exclusively brought to you by Mosyle, the only Apple Unified Platform. Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening \u0026 Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost. Request your EXTENDED TRIAL today and understand why Mosyle is everything you need to work with Apple. In possibly a first since the release of macOS Sequoia, cybersecurity researchers have identified a new attack vector that sidesteps the usual “right-click open” in favor of something rather unusual. In a recent finding shared on social media, this new method involves tricking users into dragging and dropping malicious code (via a .txt file) directly into the Terminal. more…\n\nhttps://9to5mac.com/2024/10/17/security-bite-hackers-are-now-directing-users-to-terminal-to-bypass-gatekeeper-in-macos-sequoia/",
"sig": "d3ec701a33b2dd4f2eeb0177513c9b81d738a663196d6f5ea34c811ea682f771d33a98ddf97fac2b98f109d7bf6cdefb905f2cfd0ed5082f2669dd383f2ae800"
}