{"id":3762,"date":"2026-04-14T09:48:37","date_gmt":"2026-04-14T08:48:37","guid":{"rendered":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/"},"modified":"2026-04-14T09:48:40","modified_gmt":"2026-04-14T08:48:40","slug":"security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and","status":"publish","type":"post","link":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/","title":{"rendered":"Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026"},"content":{"rendered":"<div class=\"anp-pro-entry\">\n<p class=\"anp-pro-lead\">The topic <strong>Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026<\/strong> is currently the subject of lively discussion \u2014 readers and analysts are keeping a close eye on developments.<\/p>\n<figure class=\"anp-pro-inline-figure\" style=\"margin:1.75em auto;text-align:center;max-width:100%\"><img decoding=\"async\" class=\"anp-pro-inline-img\" src=\"https:\/\/innovatenews.site\/wp-content\/uploads\/2026\/04\/Security-Bite-Matrix-Hack.png\" alt=\"\" style=\"margin:0 auto;max-width:100%;width:auto;height:auto;object-fit:contain;object-position:center\" loading=\"lazy\"><\/figure>\n<p class=\"anp-pro-p\">This is taking place in a dynamic environment: companies\u2019 decisions and competitors\u2019 reactions can quickly change the picture.<\/p>\n<p class=\"anp-pro-p\">9to5Mac Security Bite is exclusively brought to you by\u00a0Mosyle, the only Apple Unified Platform.\u00a0Making Apple devices work-ready and enterprise-safe is all we do. Our unique integrated approach to management and security combines state-of-the-art Apple-specific security solutions for fully automated Hardening &amp; Compliance, Next Generation EDR, AI-powered Zero Trust, and exclusive Privilege Management with the most powerful and modern Apple MDM on the market. The result is a totally automated Apple Unified Platform currently trusted by over 45,000 organizations to make millions of Apple devices work-ready with no effort and at an affordable cost.\u00a0Request your EXTENDED TRIAL\u00a0today and understand why Mosyle is everything you need to work with Apple.<\/p>\n<figure class=\"anp-pro-inline-figure\" style=\"margin:1.75em auto;text-align:center;max-width:100%\"><img decoding=\"async\" class=\"anp-pro-inline-img\" src=\"https:\/\/innovatenews.site\/wp-content\/uploads\/2026\/04\/Pasted_Image_1_2_24__5_39-PM.png\" alt=\"\" style=\"margin:0 auto;max-width:100%;width:auto;height:auto;object-fit:contain;object-position:center\" loading=\"lazy\"><\/figure>\n<p class=\"anp-pro-p\">In this episode, I break down what I think is the most significant finding from Jamf\u2019s latest Security 360 report: trojan malware now accounting for over 50% of all Mac malware detections. This is up from roughly 17% just a year prior and beats out infostealers for the number one spot. But its not as simple as trojans are just getting popular\u2026<\/p>\n<p class=\"anp-pro-p\">It basically comes down to one malware family, Atomic Stealer (shocker), which is now simultaneously sitting at the top of both the trojan and infostealer categories. That dual classification is reshaping how we should think about the Mac threat landscape, because the old lines between malware categories I think are blurring.<\/p>\n<aside class=\"anp-pro-aside\" aria-label=\"context\">\n<p class=\"anp-pro-kicker\">Why it matters<\/p>\n<p class=\"anp-pro-p\">News like this often changes audience expectations and competitors\u2019 plans.<\/p>\n<p class=\"anp-pro-p\">When one player makes a move, others usually react \u2014 it is worth reading the event in context.<\/p>\n<\/aside>\n<aside class=\"anp-pro-aside\" aria-label=\"outlook\">\n<p class=\"anp-pro-kicker\">What to look out for next<\/p>\n<p class=\"anp-pro-p\">The full picture will become clear in time, but the headline already shows the dynamics of the industry.<\/p>\n<p class=\"anp-pro-p\">Further statements and user reactions will add to the story.<\/p>\n<\/aside>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The topic Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026 is currently &hellip; <a title=\"Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026\" class=\"hm-read-more\" href=\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/\"><span class=\"screen-reader-text\">Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026<\/span>Read more<\/a><\/p>\n","protected":false},"author":0,"featured_media":3763,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[143,955,954,953,197],"class_list":["post-3762","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovate","tag-apple","tag-atomic","tag-bite","tag-malware","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026 - innovatenews.site<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026 - innovatenews.site\" \/>\n<meta property=\"og:description\" content=\"The topic Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026 is currently &hellip; Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/\" \/>\n<meta property=\"og:site_name\" content=\"innovatenews.site\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-14T08:48:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-14T08:48:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/innovatenews.site\/wp-content\/uploads\/2026\/04\/Security-Bite-Matrix-Hack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026\",\"datePublished\":\"2026-04-14T08:48:37+00:00\",\"dateModified\":\"2026-04-14T08:48:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/\"},\"wordCount\":348,\"image\":{\"@id\":\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/innovatenews.site\/wp-content\/uploads\/2026\/04\/Security-Bite-Matrix-Hack.jpg\",\"keywords\":[\"Apple\",\"Atomic\",\"Bite\",\"Malware\",\"Security\"],\"articleSection\":[\"Innovate\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/\",\"url\":\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/\",\"name\":\"Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026 - innovatenews.site\",\"isPartOf\":{\"@id\":\"https:\/\/innovatenews.site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/innovatenews.site\/wp-content\/uploads\/2026\/04\/Security-Bite-Matrix-Hack.jpg\",\"datePublished\":\"2026-04-14T08:48:37+00:00\",\"dateModified\":\"2026-04-14T08:48:40+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#primaryimage\",\"url\":\"https:\/\/innovatenews.site\/wp-content\/uploads\/2026\/04\/Security-Bite-Matrix-Hack.jpg\",\"contentUrl\":\"https:\/\/innovatenews.site\/wp-content\/uploads\/2026\/04\/Security-Bite-Matrix-Hack.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/innovatenews.site\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/innovatenews.site\/#website\",\"url\":\"https:\/\/innovatenews.site\/\",\"name\":\"innovatenews.site\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/innovatenews.site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026 - innovatenews.site","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/","og_locale":"en_US","og_type":"article","og_title":"Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026 - innovatenews.site","og_description":"The topic Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026 is currently &hellip; Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026Read more","og_url":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/","og_site_name":"innovatenews.site","article_published_time":"2026-04-14T08:48:37+00:00","article_modified_time":"2026-04-14T08:48:40+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/innovatenews.site\/wp-content\/uploads\/2026\/04\/Security-Bite-Matrix-Hack.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#article","isPartOf":{"@id":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/"},"author":{"name":"","@id":""},"headline":"Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026","datePublished":"2026-04-14T08:48:37+00:00","dateModified":"2026-04-14T08:48:40+00:00","mainEntityOfPage":{"@id":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/"},"wordCount":348,"image":{"@id":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#primaryimage"},"thumbnailUrl":"https:\/\/innovatenews.site\/wp-content\/uploads\/2026\/04\/Security-Bite-Matrix-Hack.jpg","keywords":["Apple","Atomic","Bite","Malware","Security"],"articleSection":["Innovate"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/","url":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/","name":"Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026 - innovatenews.site","isPartOf":{"@id":"https:\/\/innovatenews.site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#primaryimage"},"image":{"@id":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#primaryimage"},"thumbnailUrl":"https:\/\/innovatenews.site\/wp-content\/uploads\/2026\/04\/Security-Bite-Matrix-Hack.jpg","datePublished":"2026-04-14T08:48:37+00:00","dateModified":"2026-04-14T08:48:40+00:00","author":{"@id":""},"breadcrumb":{"@id":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#primaryimage","url":"https:\/\/innovatenews.site\/wp-content\/uploads\/2026\/04\/Security-Bite-Matrix-Hack.jpg","contentUrl":"https:\/\/innovatenews.site\/wp-content\/uploads\/2026\/04\/Security-Bite-Matrix-Hack.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/innovatenews.site\/index.php\/2026\/04\/14\/security-bite-podcast-atomic-stealer-is-blurring-the-line-between-infostealers-and\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/innovatenews.site\/"},{"@type":"ListItem","position":2,"name":"Security Bite Podcast: Atomic Stealer is blurring the line between infostealers and\u2026"}]},{"@type":"WebSite","@id":"https:\/\/innovatenews.site\/#website","url":"https:\/\/innovatenews.site\/","name":"innovatenews.site","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/innovatenews.site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/innovatenews.site\/index.php\/wp-json\/wp\/v2\/posts\/3762","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/innovatenews.site\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/innovatenews.site\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/innovatenews.site\/index.php\/wp-json\/wp\/v2\/comments?post=3762"}],"version-history":[{"count":1,"href":"https:\/\/innovatenews.site\/index.php\/wp-json\/wp\/v2\/posts\/3762\/revisions"}],"predecessor-version":[{"id":3766,"href":"https:\/\/innovatenews.site\/index.php\/wp-json\/wp\/v2\/posts\/3762\/revisions\/3766"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/innovatenews.site\/index.php\/wp-json\/wp\/v2\/media\/3763"}],"wp:attachment":[{"href":"https:\/\/innovatenews.site\/index.php\/wp-json\/wp\/v2\/media?parent=3762"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/innovatenews.site\/index.php\/wp-json\/wp\/v2\/categories?post=3762"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/innovatenews.site\/index.php\/wp-json\/wp\/v2\/tags?post=3762"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}