What’s in the Blue Bin: Recycled Malware!

View Slides

This session highlighted how to thwart advanced adversaries who repurpose Mac malware for cyberattacks.

This session highlighted how advanced adversaries can repurpose Mac malware for cyberattacks. Although traditional security solutions fail to detect such attacks, there is a solution that thwart them!