Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19
Introduction
00:00 • 4min
How Did You Become Interested in Detection Engineering and Incident Response?
03:39 • 3min
I'd Like to Bring Max Into My Environment, Right?
06:44 • 3min
Is Apple Going to Bring in Max I?
09:21 • 5min
What's the Capability, Opportunity and Intent to Do Harm?
13:56 • 3min
Is There a Difference in Security Products?
16:43 • 2min
Mac OS X Security
18:42 • 5min
Do You Want to Allow It?
23:24 • 2min
Detecting Malware on Mac OS X
25:05 • 4min
How to Catch Mac Persistence on Mac OS X
28:46 • 2min
Blue Team Fundamentals - The Best Course Ever!
30:39 • 3min
How to Stop Malicious Programmes on the Hard Drive?
33:09 • 4min
Yara Signatures - Is That Something?
37:31 • 2min
What's the Notarization?
39:28 • 3min
Macoas Ventura - Is That Still a Gatekeeper?
42:36 • 3min
Is There a Malware Detection Tool in Macaas?
45:11 • 5min
Script Based Maware and Omaco Executable Style Mawar Files?
49:41 • 3min
Mac OS X Threat Hunting Processes
53:03 • 3min
How Do You Find Out What You're Up To?
55:33 • 4min