-

Last day to submit your open-source (macOS) security tool to @ToolsWatch's "Aloha Armory" happening at "Objective by the Sea" v3.0#OBTS More info/to submit: https://toolswatch.org/2019/12/objective-by-the-sea-toolswatch-to-release-the-first-edition-of-macos-aloha-armory/ … Big mahalo to@JAMFSoftware for sponsoring the "Aloha Armory" event
pic.twitter.com/BEP7DUEyET
-
Vladimir Metnew (@vladimir_metnew) of@Grammarly will be presenting, "File Quarantine Handling in macOS Apps" ...after exploring `file quarantine` internals he'll discuss remote exploitation of popular 3rd-party apps that fail to leverage this security mechanism!

#OBTSPrikaži ovu nit -
Other than
@patrickwardle’s Malware Analysis at#OBTS and@iamevltwin’s SANS FOR518 is there any macOS Security training happening this year?Prikaži ovu nit -
Thanks to our fabulous teachers who kicked off our special Town Meeting with a Masterpiece skit.
#seshasjoy#OBTS pic.twitter.com/PeaeI8CVlW
-
So excited about Masterpiece!
#OBTS#seshasjoypic.twitter.com/eXIzFvJJ2G -
We're beyond stoked on the cutting edge macOS & iOS research, to be presented by world-class security researchers at "Objective by the Sea" v3.0: https://objectivebythesea.com/v3/content.html

#OBTS Register today: https://objectivebythesea.com/v3/attending.html …Prikaži ovu nit -
[
#OBTS v3.0 News ] Announcing conf talks: https://objectivebythesea.com/v3/content.html Speakers@_bazad,@iamevltwin,@5aelo,@patrickwardle, et al. will present:
os internals
malware analysis
tool making/breaking
bug hunting/exploitation
Conference will sell out so register today! -
Want to speak at the world's only Mac Security Conf ...in Hawaii!?

Submit an #OBTS v3.0 talk: https://objectivebythesea.com/v3/cfp.html Topics include macOS (& iOS):
os internals
malware analysis
tool making & breaking
bug discovery & exploitation
CFP closes tomorrow, 12/31/19! -
Microsoft has patched the automatic macro execution bug on
(CVE-2019-1457) 
Go update!
Was a fun bug to weaponize into a comprehensive exploit that could remotely & persistently infect macOS Catalina by users simply opening a document
→
Full details @ #OBTS v3.0?
pic.twitter.com/yRxJD78Faw
-
"Objective by the Sea" the world's only Mac security conference is back, Mar. 2020

Stoked to announce #OBTS v3.0:
03/11 (training), 03/12 - 13 (talks)
Maui, Hawaii
Free for our patrons
Submit a talk or register:
https://objectivebythesea.com/v3/
See you in Hawaii!! 

-
We just published a technical write up of my talk at
#OBTS about hypervisor-based analysis of macOS malware. Check it out!@objective_seehttps://twitter.com/vmray/status/1156926897470808070 …
-
Slides From recent talk at
#OBTS: Herding Cattle in The Desert: How malware actors have adjusted to new security mechanisms in macOS Mojave by our very own@platdrag and@RoeeSRV. We'll be releasing a paper with all the insights from this research soon. Stay Tuned!https://twitter.com/objective_see/status/1150494462553948160 …
-
finally home from “Objective by the Sea” v2.0
#OTBS Beyond grateful for all the amazing speakers, sponsors, & attendees who continue to make this dream a reality!
...and yes, planning for #OBTS v3.0 has already begun
pic.twitter.com/ORY7MRoGMg
-
I just uploaded the slides for my KeySteal presentation at Objective by the Sea
#OBTS. You can find them here: https://www.pinauten.de/resources/KeySteal_OBTS_2019.pdf … Thanks again@patrickwardle and@andyrozen for organizing this awesome conference! -
Watching the sun set at the Palace thinking how blessed I am to have opportunities like this.

#monaco#firsttriptoeurope#palace#obts#guardianfirewall http://bit.ly/2Wn7AuA pic.twitter.com/6MmqcC3amX
-
Thank you
#obts speakers for an awesome weekend conference! Looking forward to v3.0!! @objective_seepic.twitter.com/2fKkdwLc7j
-
“So, naturally, he swapped his holographic Han Solo trading card with a friend for a 56k modem and started poking around”
@p0sixninja#OBTS https://www.wired.com/story/apple-modem-bug-since-1999/ … -
Remote access to PPP to VPN
@p0sixninja walks us through his research that ultimately has led to who we are today.#obts#privacy#security#vpn#ios#macOS#transparency#guardianfirewallpic.twitter.com/1HWx8cVpFb
-
Sample queries for use with osquery in order to find vulnerable processes and executables that make root escalations easy.
#OBTS https://gist.github.com/keeleysam/b4dded30f13c59b22d67c245ec6fa7a9 …
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

: Omer Zohar (
: