Leveraging Apple's Game Engine to Detect Threats

Leveraging Apple's Game Engine to Detect Threats

RSA Conference via YouTube Direct link

Outline

2 of 23

2 of 23

Outline

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Leveraging Apple's Game Engine to Detect Threats

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Outline
  3. 3 Macs vs. Malware
  4. 4 OSX.WindShift (2018) file esitration implant, with a unique infection vector
  5. 5 The Mac Malware of 2018 a comprehensive report on infection, persistence, and capabilities
  6. 6 CVE-2017-7149: Password Exposure
  7. 7 CVE-2017-13872: #iamroot
  8. 8 The Mac App Store
  9. 9 Process Monitoring
  10. 10 File Monitoring
  11. 11 Synthetic Click Monitoring
  12. 12 Cam/Mic Monitoring
  13. 13 Game (Logic) Engine pieces of the puzzle
  14. 14 Game (Logic) Engine: (re)Applied
  15. 15 Apple's "GameplayKit"
  16. 16 GKRuleSystem Class
  17. 17 Developing "Game Plans" detecting methods of persistence
  18. 18 Chaining Logic Blocks ...for more accurate and actionable detectio
  19. 19 Detect (All?) Things hall the power of the predicatel
  20. 20 Threat Hunting
  21. 21 GamePlan
  22. 22 Finale
  23. 23 Question & Answers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.