Rezultati pretraživanja
  1. 31. sij

    ⌛️🛠️ Last day to submit your open-source (macOS) security tool to 's "Aloha Armory" happening at "Objective by the Sea" v3.0 More info/to submit: Big mahalo to for sponsoring the "Aloha Armory" event 🙏

  2. 30. sij

    👨🏻‍💻Vladimir Metnew () of will be presenting, "File Quarantine Handling in macOS Apps" ...after exploring `file quarantine` internals he'll discuss remote exploitation of popular 3rd-party apps that fail to leverage this security mechanism! 😈☠️🤫

    Prikaži ovu nit
  3. 30. sij

    Other than ’s Malware Analysis at and ’s SANS FOR518 is there any macOS Security training happening this year?

    Prikaži ovu nit
  4. Thanks to our fabulous teachers who kicked off our special Town Meeting with a Masterpiece skit.

  5. So excited about Masterpiece!

  6. 24. sij

    We're beyond stoked on the cutting edge macOS & iOS research, to be presented by world-class security researchers at "Objective by the Sea" v3.0: 🤗😍 Register today:

    Prikaži ovu nit
  7. 22. sij

    [ v3.0 News ] Announcing conf talks: Speakers , , , , et al. will present: ⚙️ os internals 👾 malware analysis 🛠️ tool making/breaking 🐛bug hunting/exploitation ⚠️ Conference will sell out so register today!

  8. Want to speak at the world's only Mac Security Conf ...in Hawaii!? ☀️🌴 Submit an v3.0 talk: Topics include macOS (& iOS): ⚙️ os internals 👾 malware analysis 🛠️ tool making & breaking 🐛bug discovery & exploitation CFP closes tomorrow, 12/31/19!

  9. Microsoft has patched the automatic macro execution bug on🍎(CVE-2019-1457) 🙌🙌 Go update! Was a fun bug to weaponize into a comprehensive exploit that could remotely & persistently infect macOS Catalina by users simply opening a document 📝👾 Full details @ v3.0? 🤔

  10. 29. lis 2019.

    "Objective by the Sea" the world's only Mac security conference is back, Mar. 2020 😍🥳 Stoked to announce v3.0: 🗓️03/11 (training), 03/12 - 13 (talks) 📍Maui, Hawaii ♥️ Free for our patrons Submit a talk or register: See you in Hawaii!! ☀️🌴

  11. 10. kol 2019.
  12. 1. kol 2019.

    We just published a technical write up of my talk at about hypervisor-based analysis of macOS malware. Check it out!

  13. 15. srp 2019.

    Slides From recent talk at : Herding Cattle in The Desert: How malware actors have adjusted to new security mechanisms in macOS Mojave by our very own and . We'll be releasing a paper with all the insights from this research soon. Stay Tuned!

  14. finally home from “Objective by the Sea” v2.0 Beyond grateful for all the amazing speakers, sponsors, & attendees who continue to make this dream a reality! 🙏🏼😍 ...and yes, planning for v3.0 has already begun 🤗

  15. 9. lip 2019.

    I just uploaded the slides for my KeySteal presentation at Objective by the Sea . You can find them here: Thanks again and for organizing this awesome conference!

  16. Watching the sun set at the Palace thinking how blessed I am to have opportunities like this. 😍❤️

  17. 2. lip 2019.

    Thank you speakers for an awesome weekend conference! Looking forward to v3.0!! ⁦

  18. “So, naturally, he swapped his holographic Han Solo trading card with a friend for a 56k modem and started poking around”

  19. 2. lip 2019.

    Remote access to PPP to VPN walks us through his research that ultimately has led to who we are today.

  20. 2. lip 2019.

    Sample queries for use with osquery in order to find vulnerable processes and executables that make root escalations easy.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.