MacBot has declined from 380,000 Macs to 270,000 in the previous 24 hours The Flashback MacBot has shrunk from a claimed 600,000 infected Macs on 5 April to 270,000 on 11 April. Symantec reported on 11 April that the MacBot has declined from 380,000 Macs to 270,000 in the previous 24 hours.Flashback relies on a vulnerability in Java which Apple patched on 4 April. It was first identified by security firm Intego last year. Apple is now developing software to remove Flashback malware, but it has been criticised for its slow response to the three-month-old Flashback security breach. Originally, Flashback masqueraded as an installer for Adobe’s Flash Player – hence the name – but the malware has changed tacks recently, pretending to be a Mac software update or a Java updater.Apple’s update patches multiple vulnerabilities in Java 1.6.0_29 – including some that could allow malicious code to run on your Mac outside of the Java sandbox, triggered merely by your visiting a webpage containing a nefarious code. Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe