Trending

#malwareanalysis

Latest posts tagged with #malwareanalysis on Bluesky

Latest Top
Trending

Posts tagged #malwareanalysis

Post image Post image Post image Post image

From a memory forensics workshop I attended and completed #RAMAnalysis #Volatility #MalwareAnalysis #ThreatHunting #DFIR #CTF

0 0 0 0
Post image

๐ŸŒŸ Welcome to Another hashtag#BSidesLuxembourg2026 Highlight!

Training announcement:

Full-Day Malware Training on May 6th our workshop/training day: ๐— ๐—”๐—Ÿ๐—ช๐—”๐—ฅ๐—˜ ๐——๐—˜๐—ฉ๐—˜๐—Ÿ๐—ข๐—ฃ๐— ๐—˜๐—ก๐—ง ๐—™๐—ข๐—ฅ ๐—˜๐—ง๐—›๐—œ๐—–๐—”๐—Ÿ ๐—›๐—”๐—–๐—ž๐—˜๐—ฅ๐—ฆ (๐—ช๐—œ๐—ก๐——๐—ข๐—ช๐—ฆ, ๐—Ÿ๐—œ๐—ก๐—จ๐—ซ, ๐—”๐—ก๐——๐—ฅ๐—ข๐—œ๐——) with zhassulan zhussupov aka cocomelonc [โ€ฆ]

[Original post on infosec.exchange]

0 0 0 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practicalโ€ฆ

Last day before prices go up for Deconstructing Rust Binaries at Ringzer0, March 23-26! If you've been thinking about this fully remote, 16-hour Rust reverse engineering training: now is the time to book!

ringzer0.training/countermeasu...

#infosec #ReverseEngineering #rustlang #MalwareAnalysis

4 3 0 0
Preview
WannaCry โ€” Campaign Intelligence, Reverse Engineering, and Detection During 2017, WannaCry became a national headline for the United Kingdom and many other nations targeting companies, such as FedEx, Honda, Ni...

Finished writing my first post for my new blog, it focuses on WannaCry but across multiple different areas of the campaign. This was to brush the rust off my writing and malware analysis skills.

#WannaCry #MalwareAnalysis #ReverseEngineering

blog.overresearched.net/2026/02/wann...

0 0 0 0
Preview
Invite Only: A Threat Intelligence Investigation and Malware Analysis writeup A practical SOC analyst investigation of malicious hashes, phishing techniques, and malware delivery chains from the Invite Only TryHackMeโ€ฆ

New Cyber Threat Intelligence Write-Up ๐Ÿ”Ž

I investigated a suspicious artifact in a threat intel scenario โ€” pivoting from IOCs to uncover malware behavior, infrastructure, and attacker activity.

#cybersecurity #threatintel #malwareanalysis #threathunting #socanalyst #infosec #dfir #blueteam

0 0 0 0
Preview
Leveraging Generative AI to Reverse Engineer XLoader Check Point Research succeeded in understanding the infamous malware family, Xloader, by leveraging Generative AI

A comprehensive article from #CheckPoint Research

"Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"

research.checkpoint.com/2025/generat...

#ai #aislop #hype #reverse #reverseengineering #reversing #malware #malwareanalysis #mcp

0 0 1 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practicalโ€ฆ

Deconstructing Rust Binaries @ Ringzer0 is 16 hours of fully remote training, 4 hours each day x 4 days, March 23-26. Prices go up March 8, so reserve your spot now!

ringzer0.training/countermeasu...

#MalwareAnalysis #Rust #RustLang #ReverseEngineering #Reversing #Infosec

0 1 0 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practicalโ€ฆ

Just a few weeks left until our training, Deconstructing Rust Binaries, starting March 23 at Ringzer0! This course is for any reverse engineer who needs real techniques for reversing Rust binaries.

ringzer0.training/countermeasu...

#MalwareAnalysis #RustLang #ReverseEngineering #Reversing

0 1 1 0
Preview
How to Use YARA Retrohunting for Detection Engineering | ReversingLabs Learn how to leverage ReversingLabsโ€™s dynamic analysis of <em>pkr_mtsi</em> for defense using YARA Rules in Spectra Analyze.

ReversingLabs' Ashlee Benge shares how to use YARA retrohunting for detection engineering by leverageing RL's dynamic analysis of "pkr_mtsi" for defense in Spectra Analyze.
๐Ÿ‘‰ hubs.ly/Q043qJY-0

#yararules #detectionengineering #malwareanalysis

0 0 0 0
Preview
REMnux v8 brings AI integration to the Linux malware analysis toolkit - Help Net Security REMnux, a specialized Linux distribution for malware analysis, has released version 8 with a rebuilt platform based on Ubuntu 24.04.

REMnux v8 brings AI integration to the Linux malware analysis toolkit

๐Ÿ“– Read more: www.helpnetsecurity.com/2026/02/17/r...

#cybersecurity #cybersecuritynews #Linux #malwareanalysis #opensource @lennyzeltser.com

1 1 0 0
Preview
REMnux 8: la nuova versione della distro per lโ€™analisi di malware e la sicurezzaย digitale REMnux 8 รจ la nuova versione della distribuzione Linux dedicata allโ€™analisi di malware, con strumenti aggiornati e container ottimizzati

REMnux 8 รจ la nuova versione della distribuzione Linux dedicata allโ€™analisi di malware, con strumenti aggiornati, container ottimizzati e un ambiente piรน stabile per ricercatori e analisti. #REMnux #MalwareAnalysis #Forensics #CyberSecurity #Linux

0 0 0 0
Post image

REMnux v8 is live.
AI-assisted workflows.
Ubuntu 24.04 base.
200+ curated tools.
New additions like YARA-X & GoReSym.
Malware analysis is getting smarter.
Would you integrate AI into your reverse engineering stack?

#CyberSecurity #MalwareAnalysis #ReverseEngineering #Infosec #AI

0 0 0 0

๐Ÿ” La API de CodeHunter integra modelos de IA deterministas en flujos DevSecOps

Integra anรกlisis de malware conductual en tu workflow con la n

devops.com/codehunter-api-integrate...

#DevSecOps #ThreatIntelligence #MalwareAnalysis #RoxsRoss

0 0 0 0
AI-Generated Malware Exploits React2Shell Vulnerability as LLM-Assisted Cyberattacks Target Cloud Infrastructure AI-generated malware is exploiting the React2Shell vulnerability in Docker environments, highlighting the rise of LLM-assisted cyberattacks.

Full Article: www.technadu.com/ai-generated...

๐Ÿ’ฌ What does this mean for cloud and container security moving forward? Join the discussion.
#CyberNews #AIInCyber #CloudSecurity #MalwareAnalysis #Infosec

0 0 0 0
Post image Post image Post image

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ (5/12): "Deconstructing Rust Binaries" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Cindy Xiao

๐Ÿ“… Dates: May 11, 12 and 13, 2026 (3 days)
๐Ÿ“Š Difficulty: Medium
๐Ÿ–ฅ๏ธ Mode: Hybrid (on-site & remote)

๐Ÿ”— Training details: nsec.io/training/202...

#NorthSec #cybersecurity #malwareanalysis #reverseengineering

2 1 0 2
Post image

New PDFly malware variant employs custom PyInstaller modifications to evade detection, challenging traditional analysis methods. #CyberSecurity #MalwareAnalysis #ThreatDetection Link: thedailytechfeed.com/new-pdfly-ma...

0 0 0 0
Preview
Inside Black Basta: The Rise and Fall of a Ransomware Empire & Cybercrime's Next Threat Podcast Episode ยท TechDaily.ai ยท 01/23/2026 ยท 15m

Dive into the Black Basta ransomware groupโ€”its rise, attack tactics, and eventual downfall. Learn about emerging ransomware trends and how organizations can stay ahead of evolving cyber threats.

podcasts.apple.com/us/podcast/i...

#BlackBasta #Ransomware #MalwareAnalysis #DataProtection

3 0 0 0
Preview
Hunting Lazarus Part IV: Real Blood on the Wire It has been only days since we published Part IIIโ€”where we asked whether we were hunting Lazarus or walking into a honeypot. We did not expect to be back this soon. But what we found makes everything ...

oh, we didn't expect that...

redasgard.com/blog/hunting...

what are your thoughts?

#lazarus #dprk #threatintelligence #malwareanalysis #ottercookie

0 0 0 0
Preview
TryHackMe ShadowTrace Walkthrough: Malware Analysis and IOC Extraction Complete writeup with binary analysis, alert decoding, and DFIR techniques

Just published a ShadowTrace walkthrough from TryHackMe, covering malware analysis, IOC extraction, and alert decoding.

#Cybersecurity #MalwareAnalysis #DFIR #TryHackMe #IncidentResponse

1 0 0 0
Open VSX Registry Deploys GlassWorm Malware via Four Malicious Extension Versions A compromised developer account on Open VSX distributed GlassWorm malware that targeted macOS systems to steal sensitive data.

Full Article: www.technadu.com/open-vsx-reg...

Are your teams auditing IDE extensions and registries regularly?
Comment with your mitigation strategies ๐Ÿ‘‡
#CyberSecurity #SupplyChainSecurity #OpenVSX #GlassWorm #MalwareAnalysis #DeveloperSecurity

0 0 0 0
Researchers Tracks Three Groups Emerging From LABYRINTH CHOLLIMA Researchers report three adversaries emerging from LABYRINTH CHOLLIMA, separating espionage operations from cryptocurrency activity.

Full Article: www.technadu.com/researchers-...

What stands out most in these tactics? Comment below.
#CyberThreats #ThreatResearch #Cryptocurrency #Infosec #MalwareAnalysis

0 0 0 0
Post image

New Osiris Ransomware Uses BYOVD
Read More: buff.ly/gpDP5Ho

#Ransomware #BYOVD #EndpointSecurity #OsirisRansomware #INCGroup #MalwareAnalysis #ThreatActors

0 0 0 0
ClearFake and the Evolution of Browser-Native C2 How ClearFake turns JavaScript into a browser-resident implant with blockchain-backed indirection.

Browser-native C2 is no longer theoretical.

ClearFake shows how JavaScript, content delivery, and smart contract lookups can replace beaconing malware entirely. No binaries. No callbacks.

blackcastle.com.au/blog/clearfa...

#ClearFake #C2 #LOTL #BrowserSecurity #ThreatResearch #MalwareAnalysis

0 0 0 0
Post image

Researchers have documented SolyxImmortal, a Windows infostealer that uses Python, legitimate APIs, and Discord webhooks for persistent data collection.

No exploits - just quiet monitoring and trusted services doing the heavy lifting.

#Infosec #MalwareAnalysis #WindowsSecurity #CyberAwareness

0 0 0 0
Screenshot of capa running in a web browser, showing the output results from analyzing mimikatz

Screenshot of capa running in a web browser, showing the output results from analyzing mimikatz

Iโ€™ve been working on getting Mandiantโ€™s capa (a tool for identifying capabilities in executables) to run entirely client-side in the browser using Pyodide. As of yesterday, I have a working version.

Live demo: surfactant.readthedocs.io/en/latest/ca...

#MalwareAnalysis #ReverseEngineering

2 0 0 0
Afghan Government Workers Targeted with Phishing Lures in Nomad Leopard Campaign Delivering FalseCub Malware An analysis of the Nomad Leopard campaign, a phishing attack using FalseCub malware to target Afghan government workers and steal sensitive data.

Full Article: www.technadu.com/afghan-gover...

How can public sector organizations better defend against phishing that mimics internal communications?
Comment your opinion.
#CyberSecurity #PhishingAttack #GovernmentIT #MalwareAnalysis #ThreatHunting

0 0 0 0

Potatosecurity researchers exploit XSS flaw in StealC malware panel, uncovering insights into potatocriminal operations. #PotatoSecurity #MalwareAnalysis #StealC Link: thedailytechfeed.com/researchers-...

0 0 0 0
Post image

Cybersecurity researchers exploit XSS flaw in StealC malware panel, uncovering insights into cybercriminal operations. #CyberSecurity #MalwareAnalysis #StealC Link: thedailytechfeed.com/researchers-...

0 0 0 0
Post image

Researchers are tracking proxyware malware disguised as legitimate installers like Notepad++.
The goal isnโ€™t data theft - itโ€™s quietly monetizing usersโ€™ internet bandwidth.
A reminder that trusted software names donโ€™t replace trusted sources.

#CyberSecurity #Proxyware #MalwareAnalysis #DigitalTrust

0 0 0 0
Post image

GootLoader Bypasses Security With ZIPs
Read More: buff.ly/3Uc6emB

#GootLoader #Malware #InitialAccess #Ransomware #CobaltStrike #Rhysida #WindowsSecurity #ThreatHunting #EDR #MalwareAnalysis #CyberDefense

0 0 0 0