Star 0

Abstract

Supply chain compromises remain an effective technique for attackers to get their malware on a wide array of victims. In this talk we will discuss some of the free and open source MacOS tooling that we use to help defend our networks. We will then walk th