Download pdf
New Mac malware provides insight into the abilities of hackers and nation-states. But to other adversaries, such discoveries provide fully functional capabilities that may be weaponized for their own surreptitious purposes! This session will discuss attackers’ methodology of subverting existing malware and illustrate how such “recycled” threats may remain undetected by traditional detection approaches.

Pre-Requisites: Basic understanding of malware.