From the Hacker News:
A new information-stealing malware has set its sights on Apple's macOS operating system to siphon sensitive information from compromised devices.
Dubbed MacStealer, it's the latest example of a threat that uses Telegram as a command-and-control (C2) platform to exfiltrate data. It primarily affects devices running macOS versions Catalina and later running on M1 and M2 CPUs.
ICT Bulletin #1
Your regular dose of ITech from the IMS!
Ransomware is a type of malware (short for malicious software) that infects a computer by encrypting all the files contained in it, so that the victimized person can no longer access the files. It threatens to publish the victim's personal data or perpetually block access to the files unless a ransom is paid.
When not checked immediately, ransomware will attempt to spread to connected computers.
Please be informed that the attached snapshot of an email asking you to update your email account is a phishing attack. Phishing is an attempt to obtain sensitive information by disguising as a trustworthy entity in an electronic communication for malicious reasons. Here's a quick step-by-step on how to identify a phishing mail:
1. Check the identity of the sender - the sender is disguised as www.up.edu.ph but the email address domain used is not affiliated to the university.