Comprehensive malware detection via signatures and behaviors

As malware evolves the methods used to detect them have had to evolve right along side them. In this session, we will explore the most modern reliable approaches to identifying malicious activity on macOS and how they interplay.

The talk discusses the growing prevalence of Macs in the enterprise and how this has led to more attacks and malware targeting macOS. One such attack vector is document-based attacks that leverage Office documents laden with malicious macros, which were traditionally only focused on Windows-based computers. A specific example of this is shown, highlighting how sophisticated hacker groups are leveraging this technique as well. Furthermore, as Apple's global computer market share grows, attackers have started targeting macOS with methods that were traditionally only focused on Windows-based computers. The talk ends by highlighting Apple's efforts in improving the overall security of macOS, which have forced attackers to evolve and improve their tactics, making it a cat-and-mouse game.

  1. How do attackers target Macs with methods traditionally focused on Windows-based computers?
  2. What is the best combination of methods for detecting both current and future threats against macOS?
  3. How has Apple improved the overall security of macOS, and how has this led to attackers evolving and improving their tactics?