Today, I published the following diary on isc.sans.edu: “macOS: Who’s Behind This Network Connection?“: When you must investigate suspicious behavior or work on an actual incident, you could be asked to determine who’s behind a network connection. From a pure network point of view, your firewall or any network security
![](https://blog.rootshell.be/wp-content/uploads/2020/05/isc-featured-image.jpg)