Bob Has an APT

This is an old (2011) video from the Snow Leopard days showing how Audit Explorer can use Apple's BSM audit data to detect and analyze the activity of malware installed by an Advanced Persistent Threat actor.

Using Audit Explorer and Apple's BSM audit data to analyze persistent malware.

Previous
Previous

Glowing Embers

Next
Next

Data Fence vs. Espionage