
"A design firm is editing a new campaign video on a MacBook Pro. The creative director opens a collaboration app that quietly requests microphone and camera permissions. MacOS is supposed to flag that, but in this case, the checks are loose. The app gets access anyway. On another Mac in the same office, file sharing is enabled through an old protocol called SMB version one. It's fast and convenient-but outdated and vulnerable."
"That's where Defense Against Configurations (DAC) comes in. Misconfigurations are a gift to attackers: default settings left open, remote access that should be off (like outdated network protocols such as SMB v1), or encryption that never got enabled. The goal of the latest release from ThreatLocker is simple. It makes those weak points visible on macOS so they can be fixed before they become incidents. Following the August 2025 release of DAC for Windows, ThreatLocker has launched DAC for macOS, which is currently in Beta."
Configuration oversights on macOS create exploitable gaps such as loose permission prompts, outdated file-sharing protocols, and disabled encryption. ThreatLocker’s Defense Against Configurations (DAC) surfaces risky or noncompliant macOS settings so administrators can remediate them before incidents occur. The DAC agent scans Macs up to four times daily using the existing ThreatLocker agent and reports results to the same dashboard used for Windows. The initial macOS Beta focuses on high-value controls including FileVault encryption status, built-in firewall, sharing and remote access settings, local administrator accounts, automatic update settings, Gatekeeper and app source controls, and selected security and privacy preferences.
Read at The Hacker News
Unable to calculate read time
Collection
[
|
...
]