Korea University security researchers have uncovered a new attack, SysBumps, that can bypass the Kernel Address Space Layout Randomization (KASLR) in macOS systems using Apple Silicon processors. This marks the first successful breach of KASLR on Apple’s ARM-based architecture, highlighting significant kernel hardening vulnerabilities. SysBumps uses speculative execution to breach kernel isolation, achieving about 96.28% precision in three seconds across various M-series processors and macOS versions. Apple is investigating the issue.
![](https://healsecurity.com/wp-content/uploads/2025/02/winnti20hackers20attacking20japanese20organizations20with20new20malware.webp.jpeg)
Winnti Hackers Attacking Japanese Organizations With New Malware
The China-based Winnti Group has targeted Japanese firms in key sectors such as manufacturing, materials, and energy, using a cyberattack campaign known as “RevivalStone.” Employing