- Cyber Safety
- Posts
- Infostealer Malware Surges 28% Among Mac Users
Infostealer Malware Surges 28% Among Mac Users
As cloud migration and remote work accelerate, traditional perimeter-based security is losing ground.
Enter Secure Access Service Edge (SASE)—a cloud-native framework that unifies networking and security in one scalable solution.
By merging technologies like SD-WAN, CASB, FWaaS, and ZTNA, SASE secures data access from anywhere, ensuring Zero Trust enforcement and consistent threat protection.
Comprehensive Protection: Integrates multiple tools to safeguard cloud services, remote users, and IoT devices.
Performance & Scalability: Enhances user access speed and scales with business growth.
Challenges Remain: Migration complexity, vendor selection, and cost can be hurdles—but strategic planning and vendor alignment ease the transition.
With a projected market size of $42.86B by 2032, SASE is quickly becoming a cybersecurity essential.
Now’s the time to assess your infrastructure and explore how SASE can future-proof your network.
Start learning AI in 2025
Keeping up with AI is hard – we get it!
That’s why over 1M professionals read Superhuman AI to stay ahead.
Get daily AI news, tools, and tutorials
Learn new AI skills you can use at work in 3 mins a day
Become 10X more productive

Russia is facing a new wave of cybercrime with the emergence of SuperCard malware, marking the first domestically detected attacks that exploit NFC technology for bank data theft.
This modified version of NFCGate software poses a serious threat as cybercriminals use it to skim sensitive information directly from victims’ devices. Key highlights include:
• Targeting Victims: The malware, disguising itself as a legitimate app, has already affected Android users in Russia, following its debut in Italy.
• Innovative Approach: SuperCard is marketed through Telegram channels, making it accessible as malware-as-a-service (MaaS), complete with customer support and subscription plans.
• Substantial Losses: Cyberattacks utilizing NFCGate variants have led to approximately $5.5 million in losses and over 175,000 infections in Russia.
With SuperCard now on the loose, it’s essential for users to remain vigilant against potential threats lurking in seemingly innocent apps.

In a startling revelation from Jamf's 2025 Security 360 report, infostealer malware among Mac users has surged by 28%, marking it as the dominant malware type for the first time ever.
This growing threat highlights the increasing vulnerability of Mac users despite longstanding misconceptions that Macs are immune to malware.
Key Highlights:
• Infostealers account for 28.36% of detected malware, surpassing adware.
• 32% of organizations still use devices with critical vulnerabilities.
• Approximately 10 million phishing attempts were recorded, with 90% of attacks originating from phishing.
• 1 in 10 users fell for a malicious phishing link.
Experts assert that as Macs integrate more into workplace operations, they draw greater attention from cybercriminals.
To build a stronger defense, users should remain vigilant with their cybersecurity practices, including using strong passwords, exercising caution with app installations, and keeping systems updated. Stay informed and safe!
Learn how to make AI work for you
AI won’t take your job, but a person using AI might. That’s why 1,000,000+ professionals read The Rundown AI – the free newsletter that keeps you updated on the latest AI news and teaches you how to use it in just 5 minutes a day.

A new variant of the Flodrix botnet has emerged, leveraging a critical vulnerability in Langflow, a Python framework for AI applications, to initiate DDoS attacks.
Cybersecurity experts from Trend Micro have reported that this botnet exploits the recently identified CVE-2025-3248, a flaw allowing unauthorized code execution through crafted HTTP requests. Key points include:
• The bug received a severe CVSS score of 9.8 and was patched in March 2025.
• Attackers can remotely retrieve and execute Flodrix malware on compromised servers.
• It features improved evasion techniques, making it harder to detect and analyze.
• The botnet's new DDoS capabilities are encrypted, adding another layer of obfuscation.
As the threat landscape evolves, staying vigilant against such vulnerabilities remains crucial for cybersecurity measures.
Be proactive to protect your systems from this sophisticated threat!

As AI revolutionizes cybersecurity, enterprises are grappling with a threat landscape where attackers leverage intelligent tools to execute cunning strategies.
The era of AI-driven malware and phishing attacks demands a complete transformation of security frameworks.
Key Insights:
• Attackers use AI for automated, adaptive attacks, outpacing traditional defenses.
• New threats, like hyper-personalized phishing and deepfake scams, require innovative detection methods.
• Conventional security strategies are increasingly insufficient against intelligent adversaries.
• Proactive measures are essential, including anomaly detection and AI-powered defenses.
To navigate these turbulent waters, organizations must adopt a dynamic, AI-aware approach to security.
This includes expanding threat models, deploying layered controls, and emphasizing continuous risk assessment.
The journey demands not just new skills but the vision to foresee evolving dangers in an era where protection requires as much insight as resilience. Prepare to recalibrate your defenses; the AI cybersecurity landscape is ever-changing!