
Objective-See Foundation
@objective_see
Followers
19K
Following
2K
Media
603
Statuses
5K
π π‘οΈ π οΈ Open-Source Tools π "The Art of Mac Malware" books π« "Objective by the Sea" conference Support us on https://t.co/tuGceSeyiC π
Maui, Hawaii
Joined October 2011
RT @patrickwardle: β³ Just one week left to submit your talk to #OBTS v8 .(CFP closes June 30th). Weβve expanded toβ¦.
0
15
0
Not only is @HuntressLabs a generous supporter of our Foundation, they also consistently publish top-notch research on emerging macOS threats π€©. Their latest (by @birchb0y & @stuartjash):."Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion":
0
19
77
RT @patrickwardle: Stoked to be hosting an introductory macOS malware analysis workshop at the "Malware Village" at @defcon! π¨π»βπ«πππΎ #defcoβ¦.
0
12
0
Trainings for #OBTS v8 are already starting to sell out! . So if you're planning to take a training, now's the time to grab your spot β³. View & sign up:.
Registration for our special #macOS/#iOS #security #Training .@objective_see's by the sea has closed, and we've sent out emails. You've been BCCed, so please check your spam folder. We request your RSVPs, so please let us know. We've overbooked and have a waitlist, as well.
0
0
5
RT @moonlock_lab: 4/5: We also spotted libConfigurer64.dylib, a library previously flagged by @patrickwardle and described on the @objectivβ¦.
0
1
0
RT @patrickwardle: New from @lorenzofb, confirmation that the advanced cross-platform cyberespionage backdoor 'Careto' was (as long suspectβ¦.
0
12
0
RT @patrickwardle: In 2016 I took a look at the macOS variant . which you can find in @objective_see's public macOS malware repository: htβ¦.
0
3
0
RT @0xmachos: Fantastic opportunity for students to kickstart their macOS security knowledge & career . cc @AbertayHackers @AbertayCyber @eβ¦.
0
8
0
RT @MarceloRivero: #Cthulhu Stealer for #macOS π β nothing new under the hood, just repacked. π§± Wails-based .π§ͺ No code changes β same steβ¦.
0
14
0
RT @moonlock_lab: 1/4: Moonlock Lab team notifies about an ongoing campaign involving #Odyssey #macOS #stealer and others utilizing Gatekeeβ¦.
0
9
0
RT @L0Psec: Excited for the next OFTW! Share/Apply, will be fun. Will be doing an arm64 training. :).
0
3
0
RT @Mrs_Moof: Great opportunity for students and beginners who are interested in macOS/iOS security π₯.
0
2
0
RT @rookuu_: This is going to be a lot of fun! π. I'll be talking about macOS tradecraft and internal red teaming more generally. Attendaβ¦.
0
6
0
Stoked to announce #OFTW v3.0 π₯³. This *free* student-centric event provides π trainings & talks!. π London.ποΈ July 24-25th. Note: Due to limited space you must apply to attend. βΉοΈMore info/apply:. Mahalo to @KandjiOfficial for supporting this event!.
0
19
41
RT @patrickwardle: Security & Usability are often (unfortunately) at odds with each other. Here's a (hilarious) example: . Apparently: "ifβ¦.
0
9
0
RT @patrickwardle: We're looking to fill the final trainer slot for a free (half- or full-day) workshop at our next #OFTW event! . ποΈ Date:β¦.
0
10
0
RT @patrickwardle: Haven't found a clear answer, but lldb's "target.process.follow-fork-mode child" on macOS is broken, ya?. (ChatGPT concuβ¦.
0
4
0