Loading...

I am Shroot-less

I am Shroot-less

On this episode of Security Unlocked, Jonathan Bar Or, Principal Security Researcher at Microsoft, joins hosts Natalia Godyla and Nic Fillingham to discuss his work in investigating a newly discovered vulnerability that allows attackers to bypass System Integrity Protection (SIP) in macOS. Bar Or emphasizes the importance of collaboration between researchers, vendors, and the larger security community in combating vulnerabilities. Additionally, he covers the recent Shrootless vulnerability and how it can be used by attackers. Throughout the discussion, Bar Or highlights the need for cross-platform protection to ensure the safety of Microsoft's customers.

The ultimate goal for Microsoft is to protect its customers, regardless of the product they may be using. Sometimes, this requires forming partnerships with other companies to create a unified front against newly discovered vulnerabilities. This episode underscores the criticality of this effort and the importance of investigating vulnerabilities to ensure continued protection for Microsoft's customers.

Security Unlocked is a show produced by Microsoft and distributed as part of The CyberWire Network, offering valuable insights from security experts in the field.

Published on:

Learn more
Security Unlocked
Security Unlocked

Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us!

Share post:

Related posts

Cybersecurity at 35,000 Feet

In this episode of Afternoon Cyber Tea, Ann Johnson sits down with Deneen DeFiore, Vice President and Chief Information Security Officer at Un...

9 months ago

Intrusion Detection and Prevention System (IDPS) Based on Signatures

Written in collaboration between @andrewmathu and @gusmodena   Introduction   An Intrusion Detection and Prevention S...

1 year ago

Microsoft Purview compliance portal: Data Loss Prevention – apply protection at the time of egress on endpoints

Microsoft is set to launch a Data Loss Prevention feature that extends protection to cold or unclassified files on endpoint devices through ju...

1 year ago

Microsoft Purview compliance portal: Adaptive Protection

Microsoft Purview's Adaptive Protection is a cutting-edge capability that utilizes machine learning models from Insider Risk Management to ass...

1 year ago

Network Protection for macOS starting deployment to General Availability on 1/31!

Microsoft Defender for Endpoint has good news for its macOS users. The Network Protection feature for macOS will soon be available to all the ...

1 year ago

Microsoft Defender for Endpoint Tamper Protection

In this podcast episode, Josh Bregman talks about an essential feature of Microsoft Defender for Endpoint called Tamper Protection. Tamper Pro...

2 years ago

Azure Defender for SQL - Vulnerability Assessment

Join Michael and David Trigano as they delve into the world of SQL security in the context of Azure Defender. Specifically, they examine the v...

3 years ago

Cybersecurity & Privacy Protections

This episode of Afternoon Cyber Tea with Ann Johnson focuses on the crucial topics of privacy and cybersecurity of trade secrets and features ...

2 years ago

A Librarian’s Guide to Cybersecurity

In this episode of Afternoon Cyber Tea, Ann interviews Tracy Maleeff, a security researcher at the Krebs Stamos Group cybersecurity consulting...

2 years ago
Stay up to date with latest Microsoft Dynamics 365 and Power Platform news!
* Yes, I agree to the privacy policy