<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Melomac</title>
    <link>https://melomac.com/</link>
    <description>Recent content on Melomac</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <copyright>Melomac &amp;copy; 2026</copyright>
    <lastBuildDate>Thu, 12 Mar 2026 20:13:36 +0100</lastBuildDate>
    <atom:link href="https://melomac.com/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>About Me, Myself, and I</title>
      <link>https://melomac.com/about/</link>
      <pubDate>Wed, 25 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://melomac.com/about/</guid>
      <description>&lt;p&gt;I&amp;rsquo;d love to spare you the agony of a biography, but you might want to know I started with computers on a Macintosh SE running System 7, programming musical keyboards, then drifted into pirating, debugging, reversing, and developing software 🏴‍☠️&lt;/p&gt;&#xA;&lt;p&gt;As a security researcher, I notably discovered &lt;a href=&#34;https://en.wikipedia.org/wiki/RSPlug&#34; title=&#34;Wikipedia: RSPlug&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;RSPlug&lt;/a&gt; aka the DNSChanger variant for Mac, uncovered the &lt;a href=&#34;https://en.wikipedia.org/wiki/Flashback_%28Trojan%29&#34; title=&#34;Wikipedia: Flashback (Trojan)&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Flashback&lt;/a&gt; botnet (named after the popular &lt;a href=&#34;https://www.youtube.com/watch?v=dYZEl7TVu-0&#34; title=&#34;Laurent Garnier - Flashback (Official Video by Quentin Dupieux - 1997 - F Communications)&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;track&lt;/a&gt; by Laurent Garnier), exposed the &lt;a href=&#34;https://wikileaks.org/hackingteam/emails/emailid/473861&#34; title=&#34;WikiLeaks: OSX/Crisis Has Been Used as Part of a Targeted Attack&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Hacking Team&lt;/a&gt; implant, dissected adware like &lt;a href=&#34;https://www.sentinelone.com/blog/osx-ironcore-a-or-what-we-know-about-osx-flashimitator-a/&#34; title=&#34;OSX.IronCore.A or what we know about OSX.FlashImitator.A&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;IronCore&lt;/a&gt; or &lt;a href=&#34;https://www.sentinelone.com/blog/analysis-ios-guiinject-adware-library/&#34; title=&#34;Analysis of iOS.GuiInject Adware Library&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;GuiInject&lt;/a&gt;, miners like &lt;a href=&#34;https://www.sentinelone.com/blog/osx-pwnet-a-csgo-hack-and-sneaky-miner/&#34; title=&#34;CS:GO Hacks for Mac That You Shouldn&amp;#39;t Trust&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Pwnet&lt;/a&gt; or &lt;a href=&#34;https://www.sentinelone.com/blog/osx-cpumeaner-miner-trojan-software-pirates/&#34; title=&#34;OSX.CpuMeaner: New Crypto Mining Trojan Targets macOS&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;CpuMeaner&lt;/a&gt;, and even suggested the &lt;a href=&#34;https://www.intego.com/mac-security-blog/osxshlayer-new-mac-malware-comes-out-of-its-shell/&#34; title=&#34;OSX/Shlayer: New Mac malware comes out of its shell&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;Shlayer&lt;/a&gt; name. Then I vanished into the &lt;a href=&#34;https://en.wikipedia.org/wiki/Reality_distortion_field&#34; title=&#34;Wikipedia: Reality distortion field&#34; target=&#34;_blank&#34; rel=&#34;noopener&#34;&gt;reality distortion field&lt;/a&gt;. I shipped meaningful work, outlasted some turbulence, and left with unfinished business.&lt;/p&gt;</description>
    </item>
    <item>
      <title>XProtect behavioral flop</title>
      <link>https://melomac.com/posts/xprotect-behavioral-flop/</link>
      <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://melomac.com/posts/xprotect-behavioral-flop/</guid>
      <description>&lt;p&gt;On reading the latest Security Advisories for macOS, a few friends noticed I recently went through a career change:&lt;/p&gt;&#xA;&lt;blockquote&gt;&#xA;&lt;p&gt;&lt;strong&gt;Sandbox&lt;/strong&gt;&lt;br&gt;&#xA;We would like to acknowledge Arnaud Abbati for their assistance.&lt;/p&gt;&#xA;&lt;/blockquote&gt;&#xA;&lt;p&gt;And, for once I can share what I do, I am certainly not going to miss the opportunity!&lt;/p&gt;&#xA;&lt;h2 id=&#34;threat-or-thread&#34;&gt;Threat or Thread&lt;/h2&gt;&#xA;&lt;p&gt;As far as I remember, I always kept an eye wide open on live threats to monitor their evolutions. Once I&amp;rsquo;d figure out the delivery method, I&amp;rsquo;d automate the downloading of new variants and receive notifications about notable changes.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
