From a memory forensics workshop I attended and completed #RAMAnalysis #Volatility #MalwareAnalysis #ThreatHunting #DFIR #CTF
Latest posts tagged with #malwareanalysis on Bluesky
From a memory forensics workshop I attended and completed #RAMAnalysis #Volatility #MalwareAnalysis #ThreatHunting #DFIR #CTF
๐ Welcome to Another hashtag#BSidesLuxembourg2026 Highlight!
Training announcement:
Full-Day Malware Training on May 6th our workshop/training day: ๐ ๐๐๐ช๐๐ฅ๐ ๐๐๐ฉ๐๐๐ข๐ฃ๐ ๐๐ก๐ง ๐๐ข๐ฅ ๐๐ง๐๐๐๐๐ ๐๐๐๐๐๐ฅ๐ฆ (๐ช๐๐ก๐๐ข๐ช๐ฆ, ๐๐๐ก๐จ๐ซ, ๐๐ก๐๐ฅ๐ข๐๐) with zhassulan zhussupov aka cocomelonc [โฆ]
[Original post on infosec.exchange]
Last day before prices go up for Deconstructing Rust Binaries at Ringzer0, March 23-26! If you've been thinking about this fully remote, 16-hour Rust reverse engineering training: now is the time to book!
ringzer0.training/countermeasu...
#infosec #ReverseEngineering #rustlang #MalwareAnalysis
Finished writing my first post for my new blog, it focuses on WannaCry but across multiple different areas of the campaign. This was to brush the rust off my writing and malware analysis skills.
#WannaCry #MalwareAnalysis #ReverseEngineering
blog.overresearched.net/2026/02/wann...
New Cyber Threat Intelligence Write-Up ๐
I investigated a suspicious artifact in a threat intel scenario โ pivoting from IOCs to uncover malware behavior, infrastructure, and attacker activity.
#cybersecurity #threatintel #malwareanalysis #threathunting #socanalyst #infosec #dfir #blueteam
A comprehensive article from #CheckPoint Research
"Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"
research.checkpoint.com/2025/generat...
#ai #aislop #hype #reverse #reverseengineering #reversing #malware #malwareanalysis #mcp
Deconstructing Rust Binaries @ Ringzer0 is 16 hours of fully remote training, 4 hours each day x 4 days, March 23-26. Prices go up March 8, so reserve your spot now!
ringzer0.training/countermeasu...
#MalwareAnalysis #Rust #RustLang #ReverseEngineering #Reversing #Infosec
Just a few weeks left until our training, Deconstructing Rust Binaries, starting March 23 at Ringzer0! This course is for any reverse engineer who needs real techniques for reversing Rust binaries.
ringzer0.training/countermeasu...
#MalwareAnalysis #RustLang #ReverseEngineering #Reversing
ReversingLabs' Ashlee Benge shares how to use YARA retrohunting for detection engineering by leverageing RL's dynamic analysis of "pkr_mtsi" for defense in Spectra Analyze.
๐ hubs.ly/Q043qJY-0
#yararules #detectionengineering #malwareanalysis
REMnux v8 brings AI integration to the Linux malware analysis toolkit
๐ Read more: www.helpnetsecurity.com/2026/02/17/r...
#cybersecurity #cybersecuritynews #Linux #malwareanalysis #opensource @lennyzeltser.com
REMnux 8 รจ la nuova versione della distribuzione Linux dedicata allโanalisi di malware, con strumenti aggiornati, container ottimizzati e un ambiente piรน stabile per ricercatori e analisti. #REMnux #MalwareAnalysis #Forensics #CyberSecurity #Linux
REMnux v8 is live.
AI-assisted workflows.
Ubuntu 24.04 base.
200+ curated tools.
New additions like YARA-X & GoReSym.
Malware analysis is getting smarter.
Would you integrate AI into your reverse engineering stack?
#CyberSecurity #MalwareAnalysis #ReverseEngineering #Infosec #AI
๐ La API de CodeHunter integra modelos de IA deterministas en flujos DevSecOps
Integra anรกlisis de malware conductual en tu workflow con la n
devops.com/codehunter-api-integrate...
#DevSecOps #ThreatIntelligence #MalwareAnalysis #RoxsRoss
Full Article: www.technadu.com/ai-generated...
๐ฌ What does this mean for cloud and container security moving forward? Join the discussion.
#CyberNews #AIInCyber #CloudSecurity #MalwareAnalysis #Infosec
๐๏ธ ๐ก๐ผ๐ฟ๐๐ต๐ฆ๐ฒ๐ฐ ๐ฎ๐ฌ๐ฎ๐ฒ ๐๐ผ๐ฟ๐บ๐ฎ๐๐ถ๐ผ๐ป๐/๐ง๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด๐ (5/12): "Deconstructing Rust Binaries" ๐ฝ๐ฎ๐ฟ/๐ฏ๐ Cindy Xiao
๐
Dates: May 11, 12 and 13, 2026 (3 days)
๐ Difficulty: Medium
๐ฅ๏ธ Mode: Hybrid (on-site & remote)
๐ Training details: nsec.io/training/202...
#NorthSec #cybersecurity #malwareanalysis #reverseengineering
New PDFly malware variant employs custom PyInstaller modifications to evade detection, challenging traditional analysis methods. #CyberSecurity #MalwareAnalysis #ThreatDetection Link: thedailytechfeed.com/new-pdfly-ma...
Dive into the Black Basta ransomware groupโits rise, attack tactics, and eventual downfall. Learn about emerging ransomware trends and how organizations can stay ahead of evolving cyber threats.
podcasts.apple.com/us/podcast/i...
#BlackBasta #Ransomware #MalwareAnalysis #DataProtection
oh, we didn't expect that...
redasgard.com/blog/hunting...
what are your thoughts?
#lazarus #dprk #threatintelligence #malwareanalysis #ottercookie
Just published a ShadowTrace walkthrough from TryHackMe, covering malware analysis, IOC extraction, and alert decoding.
#Cybersecurity #MalwareAnalysis #DFIR #TryHackMe #IncidentResponse
Full Article: www.technadu.com/open-vsx-reg...
Are your teams auditing IDE extensions and registries regularly?
Comment with your mitigation strategies ๐
#CyberSecurity #SupplyChainSecurity #OpenVSX #GlassWorm #MalwareAnalysis #DeveloperSecurity
Full Article: www.technadu.com/researchers-...
What stands out most in these tactics? Comment below.
#CyberThreats #ThreatResearch #Cryptocurrency #Infosec #MalwareAnalysis
New Osiris Ransomware Uses BYOVD
Read More: buff.ly/gpDP5Ho
#Ransomware #BYOVD #EndpointSecurity #OsirisRansomware #INCGroup #MalwareAnalysis #ThreatActors
Browser-native C2 is no longer theoretical.
ClearFake shows how JavaScript, content delivery, and smart contract lookups can replace beaconing malware entirely. No binaries. No callbacks.
blackcastle.com.au/blog/clearfa...
#ClearFake #C2 #LOTL #BrowserSecurity #ThreatResearch #MalwareAnalysis
Researchers have documented SolyxImmortal, a Windows infostealer that uses Python, legitimate APIs, and Discord webhooks for persistent data collection.
No exploits - just quiet monitoring and trusted services doing the heavy lifting.
#Infosec #MalwareAnalysis #WindowsSecurity #CyberAwareness
Screenshot of capa running in a web browser, showing the output results from analyzing mimikatz
Iโve been working on getting Mandiantโs capa (a tool for identifying capabilities in executables) to run entirely client-side in the browser using Pyodide. As of yesterday, I have a working version.
Live demo: surfactant.readthedocs.io/en/latest/ca...
#MalwareAnalysis #ReverseEngineering
Full Article: www.technadu.com/afghan-gover...
How can public sector organizations better defend against phishing that mimics internal communications?
Comment your opinion.
#CyberSecurity #PhishingAttack #GovernmentIT #MalwareAnalysis #ThreatHunting
Potatosecurity researchers exploit XSS flaw in StealC malware panel, uncovering insights into potatocriminal operations. #PotatoSecurity #MalwareAnalysis #StealC Link: thedailytechfeed.com/researchers-...
Cybersecurity researchers exploit XSS flaw in StealC malware panel, uncovering insights into cybercriminal operations. #CyberSecurity #MalwareAnalysis #StealC Link: thedailytechfeed.com/researchers-...
Researchers are tracking proxyware malware disguised as legitimate installers like Notepad++.
The goal isnโt data theft - itโs quietly monetizing usersโ internet bandwidth.
A reminder that trusted software names donโt replace trusted sources.
#CyberSecurity #Proxyware #MalwareAnalysis #DigitalTrust
GootLoader Bypasses Security With ZIPs
Read More: buff.ly/3Uc6emB
#GootLoader #Malware #InitialAccess #Ransomware #CobaltStrike #Rhysida #WindowsSecurity #ThreatHunting #EDR #MalwareAnalysis #CyberDefense