내가 좋아할 만한 콘텐츠
#AllYourTorrentsBelongToUs #malware #torrent All Your Torrents Belong To Us reversingminds-blog.logdown.com/posts/7821320-…
We first introduced the term “Premier Pass” during my talk at @pivot_con — describing a trend of advanced collaboration among China-aligned APT groups like Earth Estries & Earth Naga. Today, we published a blog post that explores the concept in depth. trendmicro.com/en_us/research…
#ESETresearch discovered a new wave of the well-known 🇰🇵 Lazarus campaign Operation DreamJob, now targeting the drone industry. @pkalnai @alexis_rapin welivesecurity.com/en/eset-resear… 1/9
#ElasticSecurityLabs joins forces with @tamusystem and discloses TOLLBOOTH, an IIS module used for SEO abuse that relies on publicly exposed ASP. NET machine keys: go.es.io/3L68p57
Unit 42 shares a step-by-step guide to cloud incident response. Learn how cloud investigations differ from traditional incidents, focusing on identities, misconfigurations and service interactions. bit.ly/46JEbxn
Elastic Security Labs introduces nightMARE, a versatile Python library for malware analysis, featuring static analysis tools and configuration extractors for various malware families, now available in version 0.16. #MalwareAnalysis #PythonLibrary elastic.co/security-labs/…
elastic.co
NightMARE on 0xelm Street, a guided tour — Elastic Security Labs
This article describes nightMARE, a python-based library for malware researchers that was developed by Elastic Security Labs to help scale analysis. It describes how we use nightMARE to develop...
Unit 42 recently responded to a ransomware incident involving BlackSuit at a manufacturing client. This event illustrates how a single compromised VPN credential, obtained through a vishing attack, can lead to significant operational impact. bit.ly/42DUrO3
📡New blog about my talk "CTI: The Dark Cloak" where we explore how #intel teams collaborate to tackle real #TA 🕵️♂️ We analyze threats from #CTI, assisting other teams such as #TH and #DFIR, extracting max value from every piece of info 🔗Blogpost: rexorvc0.com #RE
Unit 42 presents a proof of concept on indirect prompt injection in AI agents. This method can store malicious instructions in an agent's memory, affecting future interactions. bit.ly/3L2ppcs
We at @emproofsecurity open-sourced a free firmware reverse engineering workshop for self-study. Topics: ELF analysis, cracking, malware triage, embedded-Linux, bare-metal, crypto-key extraction, anti-analysis. Docker setup and solutions included. github.com/emproof-com/wo…
🚀 We are proud to announce the availability of Threatray Release v2.1, bringing an exciting set of additions and improvements to the platform. 🤝 We’ve partnered with @nextronsystems, a pioneer in YARA and Sigma rule detection, to bring their industry-leading detection…
Relocatable - Write C-code that will be directly compiled into raw shellcode, which can be loaded into any process without the need for tools such as Donut or sRDI github.com/tijme/relocata…
github.com
GitHub - tijme/relocatable: Boilerplate to develop raw and truly Position Independent Code (PIC).
Boilerplate to develop raw and truly Position Independent Code (PIC). - tijme/relocatable
Ever wondered how Process Explorer builds the process tree? I wrote a guide on how to code your own in C++. We cover PID reuse, parent vs. creator, recursion, and more. Read it here: trainsec.net/library/window…
trainsec.net
How to Build a Process Tree in Windows with C++ » TrainSec
Learn how Windows builds process trees, why some processes appear parentless, how PIDs are reused, and how to code your own version in C++.
Nice in-depth research! We took a look at the same loader a while back and shared a YARA rule to track it: threatray.com/blog/a-net-mul…
threatray.com
A .NET multi-stage malware delivery system | Threatray
In this blog post we detail the analysis of a .NET multi-stage malware loader that delivers stealers, RATs, and keyloggers.
I updated the #Rhadamanthys custom format converter (for XS modules), to support the latest version (0.9.x): github.com/hasherezade/hi…
github.com
Releases · hasherezade/hidden_bee_tools
Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware - hasherezade/hidden_bee_tools
#ESETresearch has mapped the labyrinth of #AsyncRAT forks, identifying the most prevalent versions of this open-source malware. While some variants are mere curiosities, others pose a more tenacious threat. welivesecurity.com/en/eset-resear… 1/7
In May 2025, #ESET participated in operations that largely disrupted the infrastructure of two notorious infostealers: #LummaStealer and #Danabot. 1/6
⚡ Exciting Update ⚡ We're thrilled to announce our new partnership with @nextronsystems to take YARA rule development and malware classification to a whole new level. 🚀 This collaboration brings Nextron's high-quality YARA rules from THOR Thunderstorm directly into…
threatray.com
Threatray and Nextron Systems Partner to Take YARA Rule Development and Malware Classification to a...
Threatray announces a new partnership with Nextron Systems.
My hot take on AI 🌶️. It's less about efficincy and more about scale. byt3bl33d3r.substack.com/p/ai-doesnt-ma…
Threatray's @_n1ghtw0lf and @_jwagner in collaboration with @proofpoint Threat Research Team have undertaken a deep dive into the India-aligned #Bitter (TA397) cyber espionage group. Read part one over at Proofpoint, where they cover campaigns, infection chains, hand-on-keyboard…
Also made a quick video on how to install TitanHide in Windows Sandbox using the SandboxBootkit project. It takes about 3 minutes end-to-end.
🔥 TitanHide has been updated to support the latest VMProtect 3.9.4 changes! The service name is now used as the device name as well, so the check for \\.\TitanHide will fail if you name the service differently 🧠
United States 트렌드
- 1. Aaron Gordon 14.9K posts
- 2. Steph 33.6K posts
- 3. Wentz 24.1K posts
- 4. Jokic 16.1K posts
- 5. Vikings 50.9K posts
- 6. #criticalrolespoilers 8,160 posts
- 7. Chargers 55.9K posts
- 8. Pacers 21.9K posts
- 9. #EAT_IT_UP_SPAGHETTI 168K posts
- 10. #LOVERGIRL 13.5K posts
- 11. Shai 22.2K posts
- 12. Brosmer 3,785 posts
- 13. Hobi 31.6K posts
- 14. Halle 15.1K posts
- 15. Herbert 16.3K posts
- 16. SPAGHETTI FT J-HOPE OUT NOW 39.9K posts
- 17. Wardell 1,511 posts
- 18. Cam Johnson 1,240 posts
- 19. Warriors 52.6K posts
- 20. #Skol 5,213 posts
내가 좋아할 만한 콘텐츠
-
d00rt
@D00RT_RM -
Steve YARA Synapse Miller
@stvemillertime -
Valthek
@ValthekOn -
CAPE Sandbox
@CapeSandbox -
S2
@sisoma2 -
Itay Cohen 🌱
@megabeets_ -
Evilcry_
@Blackmond_ -
Herbie Zimmerman
@HerbieZimmerman -
J.A.R.V.I.S
@peppermalware -
Philippe Lagadec @ hack.lu
@decalage2 -
void m4p()
@voidm4p -
Catch all the Malwa
@MalwareCantFly -
Drunk Binary
@DrunkBinary -
Antelox
@Antelox -
sean
@seanmw
Something went wrong.
Something went wrong.