#malware_analysis search results

Assembly language for malware analysis workshop at #x33fcon 2023 delivered by @vishUwell - #malware #malware_analysis #assembly

x33fcon's tweet image. Assembly language for malware analysis workshop at #x33fcon 2023 delivered by @vishUwell - #malware #malware_analysis #assembly
x33fcon's tweet image. Assembly language for malware analysis workshop at #x33fcon 2023 delivered by @vishUwell - #malware #malware_analysis #assembly

#Malware_Analysis and #Cyber_Forensics: An In-Depth Guide for the C-Suite vapt.me/MalFOR

omvapt's tweet image. #Malware_Analysis and #Cyber_Forensics: An In-Depth Guide for the C-Suite 
vapt.me/MalFOR

5 Must-Have Tools for Effective Dynamic #Malware_Analysis vapt.me/MalAna

omvapt's tweet image. 5 Must-Have Tools for Effective Dynamic #Malware_Analysis 
vapt.me/MalAna

#Malware_Analysis Reimagined: A C-Suite Strategy using the #Six_Thinking_Hats vapt.me/MA6

omvapt's tweet image. #Malware_Analysis Reimagined: A C-Suite Strategy using the #Six_Thinking_Hats 
vapt.me/MA6

#Malware_analysis 1⃣ Using Syscall() for Obfuscation/Fileless Activity isc.sans.edu/diary/Using+Sy… 2⃣ Odyssey Stealer and AMOS Campaign hunt.io/blog/macos-ody… 3⃣ TikTok Videos Promoting Malware Installation isc.sans.edu/diary/TikTok%2…


#reversing #Research #Malware_analysis "Code Modularity as a Heuristic for Malware Design", Nov. 2025. ]-> All YARA signatures used in this research - github.com/l3fdb33f/modul… // This research investigates whether modularity and plugin-based architecture can serve as a static…


Unveiling #RIFT: Enhancing #Rust #malware_analysis through pattern matching vapt.me/RIFT

omvapt's tweet image. Unveiling #RIFT: Enhancing #Rust #malware_analysis through pattern matching 
vapt.me/RIFT

#Malware_analysis 1. SleepyDuck malware secureannex.com/blog/sleepyduc… 2. Leveraging GenAI to Reverse Engineer XLoader research.checkpoint.com/2025/generativ… 3. MH-1M: A 1.34 Million-Sample Comprehensive Multi-Feature Android Malware Dataset for ML, Deep Learning, LLMs, and Threat Intelligence…


🔵this key stages of #Malware_Analysis discovery can help businesses stay protected: 1⃣Static Analysis.🔍 2⃣Dynamic Analysis.💻 3⃣Code Analysis.🧠 4⃣Behavioral Analysis.📊 Stay one step ahead of cyber threats with StackDeans' expertise.💼🛡️ DM now 📥 #StackDeans #CyberDeans

stackdeanseg's tweet image. 🔵this key stages of #Malware_Analysis discovery can help businesses stay protected:
1⃣Static Analysis.🔍
2⃣Dynamic Analysis.💻
3⃣Code Analysis.🧠
4⃣Behavioral Analysis.📊
Stay one step ahead of cyber threats with StackDeans' expertise.💼🛡️
DM now 📥
#StackDeans #CyberDeans

#Malware_analysis 1. Datzbro RAT threatfabric.com/blogs/datzbro-… 2. Detecting DLL hijacking with ML: real-world cases securelist.com/detecting-dll-… 3. Mustang Panda Publoader 0x0d4y.blog/mustang-panda-… 4. FunkSec’s FunkLocker: How AI Is Powering the Next Wave of Ransomware any.run/cybersecurity-…


Is Linux-based Malware Analysis rare or getting be better attention last days.🤔 It's so exciting 😁 #Linux_Malware_Analysis #Malware_Analysis #ELF_file_analysis

amcyd1's tweet image. Is Linux-based Malware Analysis rare or getting be better attention last days.🤔
It's so exciting 😁

#Linux_Malware_Analysis
#Malware_Analysis
#ELF_file_analysis

#Kernel_Security #Malware_analysis 1⃣ BombShell: The Signed Backdoor Hiding in Plain Sight on Framework Devices eclypsium.com/blog/bombshell… 2⃣ Singularity: Deep Dive into a Modern Stealth Linux Kernel Rootkit blog.kyntra.io/Singularity-A-… ]-> Full Source Code - github.com/MatheuZSecurit… 3⃣…


#Malware_analysis 1. OtterCandy, malware used by WaterPlum jp.security.ntt/insights_resou… 2. Tracking Malware and Attack Expansion: A Hacker Group’s Journey across Asia fortinet.com/blog/threat-re… 3. Lessons from the BlackBasta Ransomware Attack on Capita blog.bushidotoken.net/2025/10/lesson… 4.…


#Threat_Research #Malware_analysis 1. Analyzing the latest updates to XCSSET’s inventory microsoft.com/en-us/security… 2. Analysis of Qilin ransomware using an optional encryption algorithm asec.ahnlab.com/ko/90360 3. How AI-Native Development Platforms Enable Fake Captcha Pages…


#Malware_analysis 1⃣  Earth Estries/Salt Typhoon bartblaze.blogspot.com/2025/10/earth-… 2⃣  A Deep Dive Into Warlock Ransomware Deployed Via ToolShell SharePoint Chained Vulnerabilities hybrid-analysis.blogspot.com/2025/10/a-deep… 3⃣  10 npm Typosquatted Packages Deploy Multi-Stage Credential Harvester…


#reversing #Research #Malware_analysis "Code Modularity as a Heuristic for Malware Design", Nov. 2025. ]-> All YARA signatures used in this research - github.com/l3fdb33f/modul… // This research investigates whether modularity and plugin-based architecture can serve as a static…


#Malware_analysis 1. SleepyDuck malware secureannex.com/blog/sleepyduc… 2. Leveraging GenAI to Reverse Engineer XLoader research.checkpoint.com/2025/generativ… 3. MH-1M: A 1.34 Million-Sample Comprehensive Multi-Feature Android Malware Dataset for ML, Deep Learning, LLMs, and Threat Intelligence…


#Malware_analysis 1⃣  Earth Estries/Salt Typhoon bartblaze.blogspot.com/2025/10/earth-… 2⃣  A Deep Dive Into Warlock Ransomware Deployed Via ToolShell SharePoint Chained Vulnerabilities hybrid-analysis.blogspot.com/2025/10/a-deep… 3⃣  10 npm Typosquatted Packages Deploy Multi-Stage Credential Harvester…


#Malware_analysis 1⃣ LockBit 5.0 («ChuongDong») blog.checkpoint.com/research/lockb… 2⃣ Baohuo Android backdoor news.drweb.com/show/?i=15076 3⃣ Unpacking NetSupport RAT Loaders Delivered via ClickFix esentire.com/blog/unpacking… 4⃣ Fakeupdate injector + Phoenix Backdoor group-ib.com/blog/muddywate… 5⃣…


#Malware_analysis 1⃣ LockBit 5.0 («ChuongDong») blog.checkpoint.com/research/lockb… 2⃣ Baohuo Android backdoor news.drweb.com/show/?i=15076 3⃣ Unpacking NetSupport RAT Loaders Delivered via ClickFix esentire.com/blog/unpacking… 4⃣ Fakeupdate injector + Phoenix Backdoor group-ib.com/blog/muddywate… 5⃣…


#Malware_analysis 1⃣ Using Syscall() for Obfuscation/Fileless Activity isc.sans.edu/diary/Using+Sy… 2⃣ Odyssey Stealer and AMOS Campaign hunt.io/blog/macos-ody… 3⃣ TikTok Videos Promoting Malware Installation isc.sans.edu/diary/TikTok%2…


#Malware_analysis 1. OtterCandy, malware used by WaterPlum jp.security.ntt/insights_resou… 2. Tracking Malware and Attack Expansion: A Hacker Group’s Journey across Asia fortinet.com/blog/threat-re… 3. Lessons from the BlackBasta Ransomware Attack on Capita blog.bushidotoken.net/2025/10/lesson… 4.…


#Kernel_Security #Malware_analysis 1⃣ BombShell: The Signed Backdoor Hiding in Plain Sight on Framework Devices eclypsium.com/blog/bombshell… 2⃣ Singularity: Deep Dive into a Modern Stealth Linux Kernel Rootkit blog.kyntra.io/Singularity-A-… ]-> Full Source Code - github.com/MatheuZSecurit… 3⃣…


#NetSec #Malware_analysis 1⃣ LinkPro: eBPF rootkit analysis synacktiv.com/en/publication… // LinkPro is a stealthy Linux rootkit utilizing eBPF and user-space techniques for covert process/file hiding, persistent C2, and targeted attacks on AWS for financial gain 2⃣ Defrosting…


#Malware_analysis 1. IAmAntimalware: Inject Malicious Code Into Antivirus zerosalarium.com/2025/10/IAmAnt… 2. "Beamglea" phishing campaign socket.dev/blog/175-malic… 3. Polymorphic Python Malware isc.sans.edu/diary/Polymorp…


#Malware_analysis 1. Datzbro RAT threatfabric.com/blogs/datzbro-… 2. Detecting DLL hijacking with ML: real-world cases securelist.com/detecting-dll-… 3. Mustang Panda Publoader 0x0d4y.blog/mustang-panda-… 4. FunkSec’s FunkLocker: How AI Is Powering the Next Wave of Ransomware any.run/cybersecurity-…


#Threat_Research #Malware_analysis 1. Analyzing the latest updates to XCSSET’s inventory microsoft.com/en-us/security… 2. Analysis of Qilin ransomware using an optional encryption algorithm asec.ahnlab.com/ko/90360 3. How AI-Native Development Platforms Enable Fake Captcha Pages…


#DFIR #tools #Malware_analysis 1. SANS ISC Script Collection github.com/clausing/scrip… ]-> New tool: convert-ts-bash-history.py // Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This tool…


No results for "#malware_analysis"

An old malware sample with code snippet that used for checking and infecting .exe file on USB Drive. #malware_analysis

kienbigmummy's tweet image. An old malware sample with code snippet that used for checking and infecting .exe file on USB Drive.
#malware_analysis

Read it two times…best reference #malware #malware_analysis

gundamn550's tweet image. Read it two times…best reference #malware #malware_analysis

Assembly language for malware analysis workshop at #x33fcon 2023 delivered by @vishUwell - #malware #malware_analysis #assembly

x33fcon's tweet image. Assembly language for malware analysis workshop at #x33fcon 2023 delivered by @vishUwell - #malware #malware_analysis #assembly
x33fcon's tweet image. Assembly language for malware analysis workshop at #x33fcon 2023 delivered by @vishUwell - #malware #malware_analysis #assembly

#Malware_analysis #Offensive_security LDAP Enumeration: Unveiling the Double-Edged Sword of Active Directory unit42.paloaltonetworks.com/lightweight-di…

akaclandestine's tweet image. #Malware_analysis
#Offensive_security
LDAP Enumeration: Unveiling the Double-Edged Sword of Active Directory
unit42.paloaltonetworks.com/lightweight-di…

r/t #DARKSURGEON - A Windows Packer Project To Empower Incident Response, Digital #Forensics, #Malware_Analysis, And Network Defense dlvr.it/QWGLkD

profxeni's tweet image. r/t #DARKSURGEON - A Windows Packer Project To Empower Incident Response, Digital #Forensics, #Malware_Analysis, And Network Defense dlvr.it/QWGLkD

#Malware_Analysis and #Cyber_Forensics: An In-Depth Guide for the C-Suite vapt.me/MalFOR

omvapt's tweet image. #Malware_Analysis and #Cyber_Forensics: An In-Depth Guide for the C-Suite 
vapt.me/MalFOR

5 Must-Have Tools for Effective Dynamic #Malware_Analysis vapt.me/MalAna

omvapt's tweet image. 5 Must-Have Tools for Effective Dynamic #Malware_Analysis 
vapt.me/MalAna

#Malware_Analysis Reimagined: A C-Suite Strategy using the #Six_Thinking_Hats vapt.me/MA6

omvapt's tweet image. #Malware_Analysis Reimagined: A C-Suite Strategy using the #Six_Thinking_Hats 
vapt.me/MA6

Unveiling #RIFT: Enhancing #Rust #malware_analysis through pattern matching vapt.me/RIFT

omvapt's tweet image. Unveiling #RIFT: Enhancing #Rust #malware_analysis through pattern matching 
vapt.me/RIFT

How can you prepare yourself to be a Malware Analyst? Find the answer in this webinar by Eng. Amr Thabet: buff.ly/2TqzKSw Build your CV Now: buff.ly/36o3W3J #CyberTalents #Malware_Analysis #Cybersecurity #Infosec #Career #Hiring #Recruitment #Vacancies #Jobs

Cyber_Talents's tweet image. How can you prepare yourself to be a Malware Analyst? 
Find the answer in this webinar by Eng. Amr Thabet: buff.ly/2TqzKSw

Build your CV Now: buff.ly/36o3W3J

#CyberTalents #Malware_Analysis #Cybersecurity #Infosec #Career #Hiring #Recruitment #Vacancies #Jobs

Loading...

Something went wrong.


Something went wrong.


United States Trends