๐ฃ #PIVOTcon26 Agenda is here ๐ค We are thrilled to announce the lineup for this year's edition!
2โฃ days and 19 talks from leading #ThreatResearch experts.
The agenda link is in the first comment๐, and the talks and speakers are in the thread.๐งต
#CTI #ThreatIntel
1/15
10.03.2026 17:22
๐ 14
๐ 9
๐ฌ 1
๐ 1
๐ฌ
09.03.2026 21:28
๐ 0
๐ 0
๐ฌ 0
๐ 0
Victor just released v1.14.0 - improvements in macho module, tighter code generation in the compiler and the new โdepsโ command.
Congratulations to everyone involved!
github.com/VirusTotal/y...
06.03.2026 10:52
๐ 4
๐ 2
๐ฌ 0
๐ 0
a man in a suit and tie stands in front of an amazon prime logo
ALT: a man in a suit and tie stands in front of an amazon prime logo
We are still finalising the agenda and the updated website, so the #PIVOTcon26 lineup announcement will be made early next week.
#CTI #ThreatIntel #ThreatResearch
#StayTuned
06.03.2026 16:21
๐ 8
๐ 2
๐ฌ 0
๐ 0
never ask a researcher for their config parser code because it's gonna be the most spaghetti thing you've ever seen
04.03.2026 10:29
๐ 3
๐ 1
๐ฌ 0
๐ 0
yr + nushell, cause why not?
03.03.2026 23:50
๐ 4
๐ 0
๐ฌ 0
๐ 0
Reverse engineers often spend significant time deciphering third-party libraries within firmware. My talk, scheduled for Friday at 5 PM at Reverse, introduces SightHouse, an open-source initiative aimed at automatically identifying third-party functions to enhance analysis efficiency.
02.03.2026 15:20
๐ 4
๐ 4
๐ฌ 0
๐ 0
PlugX is a long-running Remote Access Trojan (RAT) that has been consistently linked to multiple China-aligned threat actors and espionage operations worldwide.
Lab 52 | S2 Grupo
lab52.io/blog/plugx-m...
26.02.2026 13:33
๐ 2
๐ 1
๐ฌ 0
๐ 0
#MustangPanda
26.02.2026 17:43
๐ 1
๐ 0
๐ฌ 0
๐ 0
RationalEdge's #REDS Platform now supports ๐ Mach-O ๐( #iOS + #macOS) and Universal (FAT) binary formats.
We now cover:
- #PE, #ELF, #MachO
- x86/64, ARM/AArch64, MIPS, PowerPC, RISC-V (32/64)
@rationaledge.bsky.social rationaledge.io
#ThreatResearch #ThreatIntel #CTI #Malware #OT #Embedded 1/3
19.02.2026 13:45
๐ 8
๐ 3
๐ฌ 1
๐ 1
Avalon Linux Bot Malware Analysis with IDA Pro (Stream - 05/02/2026)
YouTube video by Invoke RE
We've uploaded our stream from last Thursday where we analyzed the Avalon Linux bot with IDA Pro. Throughout this stream we reversed its persistence, C2 functionality, encryption and command dispatcher. Enjoy! www.youtube.com/watch?v=IaWU...
13.02.2026 14:17
๐ 1
๐ 1
๐ฌ 0
๐ 0
Decrypted/decoded a payload/binary using the Transform API in #BinaryNinja, but need a place to put it: use this to save it to your current project:
current_project.create_file(decoded_bytes, name="extracted.bin", folder=None, description="Extracted from: <insert hash of current file>")
12.02.2026 23:28
๐ 0
๐ 0
๐ฌ 0
๐ 0
BinYars metrics
binjaextras metrics
Nice to see my #BinaryNinja plugins getting some use
12.02.2026 18:19
๐ 0
๐ 0
๐ฌ 0
๐ 0
๐๏ธ ๐ก๐ผ๐ฟ๐๐ต๐ฆ๐ฒ๐ฐ ๐ฎ๐ฌ๐ฎ๐ฒ ๐๐ผ๐ฟ๐บ๐ฎ๐๐ถ๐ผ๐ป๐/๐ง๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด๐ (5/12): "Deconstructing Rust Binaries" ๐ฝ๐ฎ๐ฟ/๐ฏ๐ Cindy Xiao
๐
Dates: May 11, 12 and 13, 2026 (3 days)
๐ Difficulty: Medium
๐ฅ๏ธ Mode: Hybrid (on-site & remote)
๐ Training details: nsec.io/training/202...
#NorthSec #cybersecurity #malwareanalysis #reverseengineering
09.02.2026 17:10
๐ 2
๐ 1
๐ฌ 0
๐ 2
How can we detect malicious documents exploiting CVE-2026-21509, the recent 0-day vulnerability in MS Office ?
I designed a YARA rule for this, which detects all the malicious files that have been reported.
To get the YARA rule and all the explanations: decalage.info/CVE-2026-215...
06.02.2026 09:14
๐ 2
๐ 1
๐ฌ 0
๐ 0
Great to collaborate with old friend Duy-Phuc Pham at Trellix on this recent APT28 cluster strikeready.com/blog/apt28s-... www.trellix.com/blogs/resear...
04.02.2026 19:50
๐ 2
๐ 2
๐ฌ 0
๐ 0
30.01.2026 19:37
๐ 3
๐ 0
๐ฌ 1
๐ 0
Beginner C++ Reverse Engineering - Binary Ninja Live Stream
Learn how to recognize and apply types to decompiled C++ that's using virtual functions, inheritance and vtables, recognize and recover missing parameters, a...
Join us today from 3-5pm ET to learn to recognize and apply types to decompiled C++ that's using virtual functions, inheritance, and vtables. We'll recover missing parameters, apply types, clean up decompilation, and everything else you need to get started reversing C++! youtube.com/live/QmsUmvH...
28.01.2026 15:44
๐ 7
๐ 4
๐ฌ 0
๐ 0
The CertGraveyard is now being leveraged by MagicSword.
MagicSword makes use of certificates we report and blocks them within your environment.
I was really amazed by the work they do to block RMM and bad drivers. Now this further enables orgs to block malicious signers.
x.com/magicswordio/s...
27.01.2026 16:16
๐ 1
๐ 1
๐ฌ 0
๐ 0
New blog post is live! Xusheng tears apart a tiny Linux binary that really does not want to be reversed. Malformed ELF headers, segment tricks, layered XOR and RC4, plus a bunch of Binary Ninja tricks along the way. Read it here: binary.ninja/2026/01/23/r...
27.01.2026 15:31
๐ 7
๐ 3
๐ฌ 0
๐ 0
Malware Analysis - Malicious MS Office files without Macros
YouTube video by MalwareAnalysisForHedgehogs
๐ฆ ๐น New Video: Can office files be malicious without Macros?
โก๏ธ VSTO Add-Ins
โก๏ธ External Templates
โก๏ธ Checklist for Office analysis
#MalwareAnalysisForHedgehogs
www.youtube.com/watch?v=RtHH...
25.01.2026 07:30
๐ 6
๐ 4
๐ฌ 2
๐ 1
Awesome, time for me to update #BinYars again ๐
26.01.2026 17:07
๐ 0
๐ 0
๐ฌ 0
๐ 0
#BREAKING #ESETresearch identified the wiper #DynoWiper used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malwareโs design clearly indicates destructive intent. 1/5
23.01.2026 16:30
๐ 34
๐ 30
๐ฌ 1
๐ 5
Great work by Kim and ESET to get this story out there. The cyber threat has been off the front pages with everything else going on, but is still very real.
23.01.2026 17:48
๐ 7
๐ 1
๐ฌ 0
๐ 0