Mac Attacks Along the Kill Chain: Credential Theft [VIDEO]
This blog is the third in a series from CrowdStrike’s RSA 2019 keynote, “Hacking Exposed: Hacking Macs,” where I joined CrowdStrike’s…
This blog is the third in a series from CrowdStrike’s RSA 2019 keynote, “Hacking Exposed: Hacking Macs,” where I joined CrowdStrike’s…
This blog is the second in a series from CrowdStrike’s RSA 2019 keynote, “Hacking Exposed: Hacking Macs,” where I joined CrowdStrike…
As a senior research developer with the Falcon OverWatch managed hunting team, I joined CrowdStrike co-founders, CEO George Kurtz and CTO Dmitri…
In this blog post, we’ll take a look at an example of a typical targeted attack with OS X malware as well…