![]() ![]() Though sophisticated APT groups are behind several of these attacks, these malicious documents and their payloads remain severely constrained by recent application and OS-level security mechanisms. ![]() In this talk, we will begin by analyzing recent macro-laden documents targeting Appleās desktop OS, highlighting the macOS-specific exploit code and payloads. ![]() ![]() However on macOS though such attacks are growing in popularity and are quite en vogue, they have received far less attention from the research and security community. In the world of Windows, macro-based Office attacks are well understood (and frankly are rather old news). In this blog post complements my recent BlackHat/DefCon talk, " Office Drama on macOS". ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |