“the fields of lateral movement, mass data exfiltration, etc. on top of this, windows is still the dominating force in the enterprise business space. even with macos growing in popularity, it still pales in comparison. so it makes sense that threat actors would be more likely to t…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1059.004Unix Shell
66%
“exploiting 0 - days in the operating system to persist, as well as leveraging shells like zsh along with the shlayer malware. " i thought macs don ' t get viruses, you ' re telling me they do? " unfortunately, it ' s true. there was an ad campaign that apple ran for a number of y…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1548.006TCC Manipulation
63%
“still under - represented in the market, it makes sense that there would be a perception that macos is less vulnerable. that being said, macos has put many different security mechanisms into its operating system in order to safeguard the end user. whether it ' s transparency into…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1204.002Malicious File
31%
“exploiting 0 - days in the operating system to persist, as well as leveraging shells like zsh along with the shlayer malware. " i thought macs don ' t get viruses, you ' re telling me they do? " unfortunately, it ' s true. there was an ad campaign that apple ran for a number of y…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Discover the truth about macOS security. The Huntress Mac Guy answers common macOS security questions like why you should protect your Mac computers.