• Alerts
  • Events
  • DCR
    • Explore Cyware Products
    Alerts Events DCR
    Go to listing page

    North Korean Hackers Exploit Two MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse

    • Threat Actors
    • April 13, 2024
    • Dark Reading
    The first, not entirely new, sub-technique involves manipulation of Transparency, Consent, and Control (TCC), a security protocol that regulates application permissions on Apple's macOS.
    Read More
    • North Korean hackers
    • Transparency, Consent, and Control (TCC)
    • TCC Manipulation
    • Phantom DLL Hijacking
    • Privileged Access
    Cyware Publisher

    Publisher

    Previous

    Telegram Fixes Windows App Zero-Day Used to Launch Pyth ...

    Malware and Vulnerabilities

    Next

    FBI Warns of Massive Wave of Road Toll SMS Phishing Att ...

    Threat Intel & Info Sharing


    RESOURCES
    Cyber Fusion Center Guide
    EVENTS

    News and Updates, Hacker News

    Get in touch with us now!

    1-855-692-9927


    Download Cyware Social App

    Terms of Use Privacy Policy © 2023