<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Macos on cpus.me</title>
    <link>https://cpus.me/tags/macos/</link>
    <description>Recent content in Macos on cpus.me</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Thu, 16 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://cpus.me/tags/macos/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>XProtect and XProtect BehaviorService: previous research</title>
      <link>https://cpus.me/2026/xprotect-behavior-service/</link>
      <pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://cpus.me/2026/xprotect-behavior-service/</guid>
      <description>&lt;p&gt;Recently started looking into macOS&amp;rsquo; &lt;code&gt;XProtect&lt;/code&gt; and its satellites. There are a few interesting presentations and articles from previous research done in the last years.&#xA;I mainly want to capture some of the ones that I already went through and found valuable before I publish some of my own findings, learnings and failures.&lt;/p&gt;&#xA;&lt;p&gt;The following two presentations are particularly interesting on what &lt;code&gt;XProtect&lt;/code&gt; is and &lt;code&gt;XProtect Remediator&lt;/code&gt;:&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://youtu.be/43BIK-e7FBE?si=YWk-pVn_1CZk0kJ2&#34;&gt;MDOYVR23 - Stuart Ashenbrenner - (dm)XProtect: Stop, Drop, Shut malware down before it opens up shop&#xA;&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://youtu.be/1pJWqtBxb50?si=S6DyzwyJxFvT8SEB&#34;&gt;Black Hat USA 2025 | XUnprotect: Reverse Engineering macOS XProtect Remediator&#xA;&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;I heard about &lt;code&gt;XProtect&lt;/code&gt; before, maybe around end of 2024 or so, but never had the interest to research it. But with some of the latest updates related to clipboard pasting and &lt;code&gt;ClickFix&lt;/code&gt; campaigns, my interest grew so I started looking into how this works. My own research, so far, for this &lt;code&gt;XProtect&lt;/code&gt; feature hasn&amp;rsquo;t uncovered anything new than what is detailed in this high quality research done by &lt;a href=&#34;https://objective-see.org/blog/blog_0x87.html&#34;&gt;Patrick Wardle&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A quick first look at macOS PowerLogs</title>
      <link>https://cpus.me/2025/macos-powerlogs-1/</link>
      <pubDate>Sun, 09 Nov 2025 13:58:41 +0100</pubDate>
      <guid>https://cpus.me/2025/macos-powerlogs-1/</guid>
      <description>&lt;h2 id=&#34;intro&#34;&gt;Intro&lt;/h2&gt;&#xA;&lt;p&gt;Hi there!&lt;/p&gt;&#xA;&lt;p&gt;As I mentioned in my previous post - &lt;a href=&#34;https://cpus.me/2025/latest-goodies-10-1/&#34;&gt;Latest goodies October #1&lt;/a&gt; - there were a few interesting presentations at &lt;a href=&#34;https://youtube.com/playlist?list=PLliknDIoYszveXp7vp2RuL5wa-MaxkCzc&amp;amp;si=JBLcCi-Q_SxnHrwB&#34;&gt;OBTS v8.0&lt;/a&gt; which motivated me to learn more about macOS and *OS platforms.&#xA;One of the most interesting ones was &lt;a href=&#34;https://www.youtube.com/watch?v=dLEZgIwjcPY&#34;&gt;Sarah Edwards&amp;rsquo;s - The Power of Powerlogs&lt;/a&gt;. All presentations, slides and videos are on &lt;a href=&#34;https://objectivebythesea.org/v8/talks.html&#34;&gt;OBTS - Talks&lt;/a&gt; page.&#xA;I was aware of macOS&amp;rsquo; powerlogs (most probably from Sarah&amp;rsquo;s blog), however I never spent time investigating them in detail and learning about their structure. This time it seems like a good opportunity to do so.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
