redcanary.com
Open in
urlscan Pro
104.198.136.223
Public Scan
Submitted URL: https://i.redcanary.com/MDAzLVlSVS0zMTQAAAGLCsNnECNsmAQNPK2LT2fo4tpzWkX_f0zcGPXHKvXRa2lXHZMSbcJGmHcQhR7KP7CaZzksJc0=
Effective URL: https://redcanary.com/resources/webinars/redroc-uncaged-macos-telemetry/?utm_source=invite&utm_medium=email&utm_campai...
Submission: On April 11 via api from US — Scanned from DE
Effective URL: https://redcanary.com/resources/webinars/redroc-uncaged-macos-telemetry/?utm_source=invite&utm_medium=email&utm_campai...
Submission: On April 11 via api from US — Scanned from DE
Form analysis
3 forms found in the DOM<form id="mktoForm_3008" __bizdiag="196411175" __biza="WJ__" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); width: 851px;">
<style type="text/css"></style>
<div class="mktoTemplateBox">Welcome back, Matt Shivers<br><br><span class="mktoButtonWrap mktoNative"><button type="submit" class="mktoButton">Register Now</button></span><br><br><a class="mktoNotYou">Not you?</a></div><input type="hidden"
name="formid" class="mktoField mktoFieldDescriptor" value="3008"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="003-YRU-314"><input type="hidden" name="mktoUTMSource" class="mktoField mktoFieldDescriptor"
value="invite"><input type="hidden" name="mktoUTMMedium" class="mktoField mktoFieldDescriptor" value="email"><input type="hidden" name="mktoUTMCampaign" class="mktoField mktoFieldDescriptor" value="redroc-webinar"><input type="hidden"
name="GCLID__c" class="mktoField mktoFieldDescriptor" value="">
</form>
GET https://redcanary.com/
<form method="get" class="search-form" action="https://redcanary.com/" __bizdiag="115" __biza="WJ__"> <svg width="20" height="19" viewBox="0 0 20 19" fill="none" xmlns="http://www.w3.org/2000/svg">
<line x1="12.8839" y1="12.1161" x2="18.8839" y2="18.1161" stroke="black" stroke-width="2.5"></line>
<circle cx="7.5" cy="7.5" r="6.25" stroke="black" stroke-width="2.5"></circle>
</svg> <input id="input-search" class="search-input" name="s" type="text" placeholder="Search" autocomplete="off" autocorrect="off" autocapitalize="off" spellcheck="false"> <input type="submit" class="search-btn" value="Search"></form>
<form __bizdiag="-1927021094" __biza="WJ__" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft"
style="font-family: inherit; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;"></form>
Text Content
Skip Navigation Join us for the Threat Detection Series Live! – space is limited Register Now Get a Demo Demo * What We Do * Solutions * Resources * Partners * Company * 2022 Threat Detection Report PDF * 2022 Executive Summary PDF * Intro * Past Reports * Threats * Techniques * Introduction * Ransomware * Supply Chain Compromises * Vulnerabilities * Affiliates * Crypters-as-a-Service * Common Webshells * User-Initiated Initial Access * Malicious macOS Installers * Remote Monitoring and Management Abuse * Linux Coinminers * Abusing Remote Procedure Calls * Defense Validation and Testing * Top Threats * Rose Flamingo * Silver Sparrow * Bazar * Latent Threats * Cobalt Strike * Impacket * SocGholish * Yellow Cockatoo * Gootkit * BloodHound * Top Techniques * Command and Scripting Interpreter * Signed Binary Proxy Execution * Windows Management Instrumentation * OS Credential Dumping * Ingress Tool Transfer * Process Injection * Scheduled Task/Job * Obfuscated Files or Information * Masquerading * Hijack Execution Flow * Impair Defenses * Managed Detection and Response * Integrations * The Red Canary Difference * Get a Demo Named a leader in MDR * Atomic Red Team™ * Cloud, SaaS, and Identity Protection * MDR for Microsoft * Active Remediation * Replace your MSSP * Post-Breach Response * EDR Deployment * EDR Migration * Linux Security * View All Resources * Blog * Guides & Overviews * Case Studies * Videos * Webinars * Events * Customer Help Center Blog Sharpen your skills with the latest information, security articles, and insights. * Overview * Incident Response * Insurance & Risk * Managed Service Providers * Solution Providers * Technology Partners Red Canary Partner Connect Apply to become a partner. * About Us * News & Press * Careers - We're Hiring! * Contact Us * Trust Center and Security Contact Us How can we help you? Reach out to our team and we'll get in touch. * Liner Notes * Side 1: Trends * Side 2: Threats * Bonus Tracks: Techniques * What We Do What We Do * Managed Detection and Response * Integrations * The Red Canary Difference * Get a Demo * Solutions Solutions * Atomic Red Team™ * Cloud, SaaS, and Identity Protection * MDR for Microsoft * Active Remediation * Replace your MSSP * Post-Breach Response * EDR Deployment * EDR Migration * Linux Security * Resources Resources * View All Resources * Blog * Guides & Overviews * Case Studies * Videos * Webinars * Events * Customer Help Center * Partners Partners * Overview * Incident Response * Insurance & Risk * Managed Service Providers * Solution Providers * Technology Partners * Apply to Become a Partner * Company Company * About Us * News & Press * Careers - We're Hiring! * Contact Us * Trust Center and Security Share APRIL 19, 2023• RESOURCES • UPCOMING WEBINARS RED CANARY MAC MONITOR: A NEW, FREE TOOL FOR GATHERING MACOS TELEMETRY The free-to-use software is intended to help researchers monitor and analyze macOS system events, much like ProcMon for Windows systems. REGISTER NOW Wed., April 19, 2023 3pm ET (45 mins) Virtual Welcome back, Matt Shivers Register Now Not you? The free-to-use software is intended to help researchers monitor and analyze macOS system events, much like ProcMon for Windows systems. Visibility is hard to come by on macOS systems. While there’s a wealth of readily available tools that security teams and researchers can use to gather telemetry from Windows systems, there’s a dearth of such tools available for macOS. Organizations seeking better optics from their Apple devices have either had to combine many very specialized tools or pay for a macOS-focused EDR sensor. The resultant lack of visibility into macOS has an obvious consequence: there is a deep knowledge gap about macOS threats and corresponding detection and response strategies. In this webinar, we’ll show you how we use the Red Canary Mac Monitor tool to dig deep into macOS systems and improve our detection and response capabilities—and how it helped us discover an exploitable Gatekeeper bypass vulnerability in macOS. Attendees will leave this webinar with: * A better understanding of visibility limitations and possibilities in macOS * Strategies for leveraging visibility to expand macOS detection coverage * Additional knowledge about macOS’s Gatekeeper security feature, what it protects against, and how adversaries abuse it * Everything you need to know to download and install Red Canary Mac Monitor, a free tool for collecting telemetry from macOS system MEET THE SPEAKERS BRANDON DALTON SENIOR THREAT RESEARCHER Brandon has worked across government, academia, and the private industry on high-stakes research and software engineering projects. These experiences have propelled him onto Red Canary’s Threat Research team, where he works closely with industry partners to improve EDR telemetry resolution for macOS detections. Additionally, Brandon also leads several internal R&D projects to aid in these objectives, predominantly in Swift and Python. Brandon has worked across government, academia, and the private industry on high-stakes research and software engineering projects. These experiences have propelled him onto Red Canary’s Threat Research team, where he works closely with industry partners to improve EDR telemetry resolution for macOS detections. Additionally, Brandon also leads several internal R&D projects to aid in these objectives, predominantly in Swift and Python. MATT GRAEBER DIRECTOR, THREAT RESEARCH Matt has worked the majority of his security career in offense, facilitating his application of an attacker’s mindset to detection engineering. By pointing out gaps in detection coverage, Matt is able to effectively offer actionable detection improvement guidance. Matt loves to apply his reverse engineering skills to understand attack techniques at a deeper level in order to understand the workflow attackers use to evade security controls. Matt has worked the majority of his security career in offense, facilitating his application of an attacker’s mindset to detection engineering. By pointing out gaps in detection coverage, Matt is able to effectively offer actionable detection improvement guidance. Matt loves to apply his reverse engineering skills to understand attack techniques at a deeper level in order to understand the workflow attackers use to evade security controls. * * * * What We Do * Managed Detection and Response * Integrations * The Red Canary Difference * Get a Demo * Solutions * Atomic Red Team™ * MDR Everywhere * MDR for Microsoft * Active Remediation * Replace your MSSP * Post-Breach Response * EDR Deployment * EDR Migration * Linux Security * Alert Triage * Resources * View all Resources * Blog * Guides & Overviews * Case Studies * Videos * Webinars * Events * Customer Help Center * Newsletter * Partners * Overview * Incident Response * Insurance & Risk * Managed Service Providers * Solution Providers * Technology Partners * Apply to Become a Partner * Company * About Us * News & Press * Careers – We’re Hiring! * Contact Us * Trust Center and Security © 2014-2023 Red Canary. All rights reserved. info@redcanary.com +1 855-977-0686 Privacy Policy Trust Center and Security Our website uses cookies to provide you with a better browsing experience. More information can be found in our Privacy Policy. OK Privacy & Cookies Policy Close PRIVACY OVERVIEW This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities... Necessary Necessary Always Enabled Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. Non-necessary Non-necessary Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website. SAVE & ACCEPT Back to Top