Korea University security researchers have uncovered a new attack, SysBumps, that can bypass the Kernel Address Space Layout Randomization (KASLR) in macOS systems using Apple Silicon processors. This marks the first successful breach of KASLR on Apple’s ARM-based architecture, highlighting significant kernel hardening vulnerabilities. SysBumps uses speculative execution to breach kernel isolation, achieving about 96.28% precision in three seconds across various M-series processors and macOS versions. Apple is investigating the issue.
![](https://healsecurity.com/wp-content/uploads/2025/02/clickfix.webp.webp)
North Korean hackers spotted using ClickFix tactic to deliver malware
The North Korean group Kimsuky is employing a social engineering tactic called “ClickFix” to distribute malware to South Korean targets. The strategy tricks users into