๐ฌ
๐ฌ
Victor just released v1.14.0 - improvements in macho module, tighter code generation in the compiler and the new โdepsโ command.
Congratulations to everyone involved!
github.com/VirusTotal/y...
We are still finalising the agenda and the updated website, so the #PIVOTcon26 lineup announcement will be made early next week.
#CTI #ThreatIntel #ThreatResearch
#StayTuned
never ask a researcher for their config parser code because it's gonna be the most spaghetti thing you've ever seen
yr + nushell, cause why not?
Reverse engineers often spend significant time deciphering third-party libraries within firmware. My talk, scheduled for Friday at 5 PM at Reverse, introduces SightHouse, an open-source initiative aimed at automatically identifying third-party functions to enhance analysis efficiency.
@re-verse.io has lighting talks ๐ค
Wonder if I can dust the cobwebs off of this deob-CFF project and get it working prior to Saturday. Chances are low but going to try ๐
re-verse.io
PlugX is a long-running Remote Access Trojan (RAT) that has been consistently linked to multiple China-aligned threat actors and espionage operations worldwide.
Lab 52 | S2 Grupo
lab52.io/blog/plugx-m...
#MustangPanda
Without exaggeration, one of the most epic DPRK reports ever about.gitlab.com/blog/gitlab-...
RationalEdge's #REDS Platform now supports ๐ Mach-O ๐( #iOS + #macOS) and Universal (FAT) binary formats.
We now cover:
- #PE, #ELF, #MachO
- x86/64, ARM/AArch64, MIPS, PowerPC, RISC-V (32/64)
@rationaledge.bsky.social rationaledge.io
#ThreatResearch #ThreatIntel #CTI #Malware #OT #Embedded 1/3
1/ Today, Insikt Group is publishing on GrayCharlie, a threat actor active since mid-2023 that overlaps with SmartApeSG. GrayCharlie compromises WordPress sites and turns them into malware delivery hubs: www.recordedfuture.com/research/gra...
We've uploaded our stream from last Thursday where we analyzed the Avalon Linux bot with IDA Pro. Throughout this stream we reversed its persistence, C2 functionality, encryption and command dispatcher. Enjoy! www.youtube.com/watch?v=IaWU...
Decrypted/decoded a payload/binary using the Transform API in #BinaryNinja, but need a place to put it: use this to save it to your current project:
current_project.create_file(decoded_bytes, name="extracted.bin", folder=None, description="Extracted from: <insert hash of current file>")
Scoop: A report published last week outlined what Palo Alto researchers believed was a China-linked hacking campaign.
But after an intervention from execs, the report's language was changed to refer more vaguely to "a state-aligned group that operates out of Asia."
www.reuters.com/world/china/...
BinYars metrics
binjaextras metrics
Nice to see my #BinaryNinja plugins getting some use
๐๏ธ ๐ก๐ผ๐ฟ๐๐ต๐ฆ๐ฒ๐ฐ ๐ฎ๐ฌ๐ฎ๐ฒ ๐๐ผ๐ฟ๐บ๐ฎ๐๐ถ๐ผ๐ป๐/๐ง๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด๐ (5/12): "Deconstructing Rust Binaries" ๐ฝ๐ฎ๐ฟ/๐ฏ๐ Cindy Xiao
๐
Dates: May 11, 12 and 13, 2026 (3 days)
๐ Difficulty: Medium
๐ฅ๏ธ Mode: Hybrid (on-site & remote)
๐ Training details: nsec.io/training/202...
#NorthSec #cybersecurity #malwareanalysis #reverseengineering
github.com/VirusTotal/y... - Once again, new release with some good bug fixes and nice improvements.
How can we detect malicious documents exploiting CVE-2026-21509, the recent 0-day vulnerability in MS Office ?
I designed a YARA rule for this, which detects all the malicious files that have been reported.
To get the YARA rule and all the explanations: decalage.info/CVE-2026-215...
"State-backed #phishing attacks targeting military officials and journalists on Signal" by Zeljka Zorz, Editor-in-Chief, Help Net Security February 6, 2026 www.helpnetsecurity.com/2026/02/06/s...
Great to collaborate with old friend Duy-Phuc Pham at Trellix on this recent APT28 cluster strikeready.com/blog/apt28s-... www.trellix.com/blogs/resear...
Join us today from 3-5pm ET to learn to recognize and apply types to decompiled C++ that's using virtual functions, inheritance, and vtables. We'll recover missing parameters, apply types, clean up decompilation, and everything else you need to get started reversing C++! youtube.com/live/QmsUmvH...
The CertGraveyard is now being leveraged by MagicSword.
MagicSword makes use of certificates we report and blocks them within your environment.
I was really amazed by the work they do to block RMM and bad drivers. Now this further enables orgs to block malicious signers.
x.com/magicswordio/s...
New blog post is live! Xusheng tears apart a tiny Linux binary that really does not want to be reversed. Malformed ELF headers, segment tricks, layered XOR and RC4, plus a bunch of Binary Ninja tricks along the way. Read it here: binary.ninja/2026/01/23/r...
๐ฆ ๐น New Video: Can office files be malicious without Macros?
โก๏ธ VSTO Add-Ins
โก๏ธ External Templates
โก๏ธ Checklist for Office analysis
#MalwareAnalysisForHedgehogs
www.youtube.com/watch?v=RtHH...
Awesome, time for me to update #BinYars again ๐
#BREAKING #ESETresearch identified the wiper #DynoWiper used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malwareโs design clearly indicates destructive intent. 1/5
Great work by Kim and ESET to get this story out there. The cyber threat has been off the front pages with everything else going on, but is still very real.
New Children's Health Defense site registered on 1/9/26 and currently in development:
covidjustice[.]org
covidjustice[.]metalteam[.]dev (69.16.249[.]248, dev site)