Advertisement
According to an Apple support document, it relies solely on internal threat-Intelligence information and investigations to detect such attacks.