Hypothesis-driven MacOS Threat Hunting - Plug
Open Threat Research - The Hunt for Red Apples: How to threat hunt and emulate Ocean Lotus on macOS
Threat Hunting On Linux And Mac With Auditbeat System Module - Aaron Jewitt
Threat Hunting the macOS edition Megan Carney
GrrCon 2018 Ada11 Threat Hunting the macOS edition Megan Carney
5. Max K: Hunting for macOS Application Logic Bugs, Logic Not Included!
My “Aha!” Moment - Methods, Tips, & Lessons Learned in Threat Hunting - SANS THIR Summit 2019
The Security Show: Threat hunting deep dive
Building a Hunting Program at a Global Scale | 2020 Threat Hunting & Incident Response Summit
Choose your own MITRE ATT&CK® Adventure
OBTS v1.0: "When Macs Come Under ATT&CK" - Richie Cyrus
Analysis of AppleJeus Malware by Lazarus Group
Coffee Talk with SURGe: the Interview Series featuring Sydney Howard
A Process is No One: Hunting for Token Manipulation
The wild world of macOS Installers | JNUC 2021
Exploring the Labyrinth of Macos Intrusions - ATT&CKcon 4.0 Day 1
T304 Purpose Driven Hunt What do I do with all this data Jared Atkinson Robby Winchester
Real-Time Threat Hunting - SANS Threat Hunting & Incident Response Summit 2017
Neil “Grifter” Wyler - Practical Threat Hunting Straight Facts and Substantial Impacts
What is Threat Hunting 101 | Scope and Industry | Threat Hunting Tools