Advertisement · 728 × 90

Posts by Pete Markowsky

CEL has a lot of features and is often a good way to remove unneeded functionality e.g. preventing users to run Electron apps with --inspect or Chrome with remote debugging.

You can also block env vars so if you need to stop the DYLD_ env vars you can.

More CEL functionality to come.

3 months ago 0 0 0 0

A fun little entry where we can use network extension entitlements to flag remote access tools and VPNs.

macOS entitlements are kinda slept on for detection & prevention

It's not a silver bullet, but it certainly gets you a lot of coverage without maintaining a list.

3 months ago 1 0 0 0

Other fun things we posted over the weekend @northpolesec.bsky.social

- Day 21: macOS insecurity - blocking dump-keychain

northpole.security/blog/2025-ad...

- Day 20: Where's the remote - blocking users from enabling SSH & remote apple events via systemsetup

northpole.security/blog/2025-ad...

3 months ago 0 0 0 0

This is another old one & a classic from
@theevilbit.bsky.social's Beyond Good Ol' LaunchAgents theevilbit.github.io/beyond/beyon...

Workshop and Santa's File access rules were built to allow you to lock down directories like this to just the apps that need it & quickly get legitimate approvals.

3 months ago 0 0 0 0

This is probably the most common, known & least stealthy option for malware to persist

This year Kristin Smith gave a solid talk at BSides Canberra on using models & our file access rules to find anomalous creation LaunchDaemons

You can see the talk here youtube.com/watch?v=YJWf...

4 months ago 1 0 0 0

This is an oldie but can still be relevant.

@theevilbit.bsky.social calls it out directly in his blog series Beyond Good Ol' LaunchAgents theevilbit.github.io/beyond/beyon...

4 months ago 0 0 0 0

This is a super common technique for infostealers e.g. Huntress blogged about this yesterday

www.huntress.com/blog/amos-st...

just blogged about AMOS doing this yesterday, after tricking users to install their malware via AI generated instructions to use bash and curl.

4 months ago 0 0 0 0

Always enjoy your set lists. Thanks

4 months ago 1 0 1 0

One thing I like about our system is that it's easy to make these kinda trip wires where you can lock these things down. But quickly make an exception if you need to allow something and then dial it back off.

4 months ago 0 0 0 0
4 months ago 0 0 0 0
Advertisement

This is another simple but powerful control. You almost never need to disable Gatekeeper. And if you do you should be able to handle that on a case by case basis.

4 months ago 0 0 0 0

Stopping things like infostealers by locking down the cookie jar to just the signed browser processes is a simple but powerful control

While Chrome is working on Device Bound Session Credentials (DBSC). You can deploy this today.

Also if you use another browser like Firefox, it'll still work.

4 months ago 1 1 0 0

This is a great feature that I'm using daily.

Honestly feels like we found a solid way to close the monitor mode is always on for devs gap.

Super proud of the team @northpolesec.bsky.social for landing this

4 months ago 2 0 0 0

What about the imaginary CISO?

5 months ago 4 0 0 0

Will be curious to get your thoughts on it. The soundtrack is great.

But something feels off about it for me.

6 months ago 2 0 1 0

Join us in celebrating North Pole Security's first anniversary! 🎉

Reflect on a year of innovation, growth, & unwavering commitment to livable security with Santa and Workshop. Read about our journey and what's next! #FirstAnniversary #Santa #Workshop

northpole.security/blog/one-yea...

6 months ago 0 1 0 0
Preview
a man in a suit says " don 't you think she looks tired " to another man in a suit ALT: a man in a suit says " don 't you think she looks tired " to another man in a suit
7 months ago 2 0 0 0
Post image

m.media-amazon.com/images/I/71m...

8 months ago 1 0 1 0
Advertisement

Headed to hacker summer camp looking first to seeing people and sharing @northpolesec.bsky.social’s Workshop with people.

8 months ago 1 0 0 0

Tbh I did it because it seems to get the word out to folks who’ve split from Twitter, to Bluesky and mastodon.

LinkedIn seems to be one of the few common spots.

Also I’m stuck on the plane.

8 months ago 0 0 1 0

In case you see me. Yes this is why I look so exhausted. 😂

8 months ago 2 0 0 0

It's not just one release, it's two!

8 months ago 2 0 1 0

It's been an 11 month journey to build Workshop, the integrated backend Santa always deserved

Lots of things we'd always wanted at Google are now real

The MVP's already powerful & we're just getting started

Thank you to Zane & the team at A16Z, Royal Hansen and the team @northpolesec.bsky.social

8 months ago 2 0 0 0
Preview
Santa FAA rule to prevent spotlight plugins from being registered Santa FAA rule to prevent spotlight plugins from being registered - sploitlight.md

I made this gist gist.github.com/pmarkowsky/9... to show how @northpolesec.bsky.social Santa FAA rules lockdown the Spotlight importers used in Sploitlight microsoft.com/en-us/securi... &
@theevilbit.bsky.social's persistence trick.

I also added an example rule for blocking access to the DBs.

8 months ago 1 0 0 0

Going to be attending @bsideslv.org and around. Summer camp.

If you’re around say hello.

8 months ago 0 0 0 0

This was a big release. Getting CEL in opens up so many possibilities and like all good things it's a take what you need.

Really looking forward to seeing what people do with this.

9 months ago 1 0 0 0
Advertisement

Lots of great features in 2025.5.

Santa is now easier to use without having to drop to the command line.

Be sure to check out the videos in the 🧵

10 months ago 0 0 0 0

It’s something that feels like the sci-fi future media promised us as kids

11 months ago 1 0 0 0

Yikes. Got any other FRs? Asking for a friend…

11 months ago 0 0 0 0

Have to admit it's exciting to see years of work coming together.

11 months ago 0 0 0 0