Home New Trending Search
About Privacy Terms
#
#malwareanalysis
Posts tagged #malwareanalysis on Bluesky
Post image Post image Post image Post image

From a memory forensics workshop I attended and completed #RAMAnalysis #Volatility #MalwareAnalysis #ThreatHunting #DFIR #CTF

0 0 0 0
Post image

🌟 Welcome to Another hashtag#BSidesLuxembourg2026 Highlight!

Training announcement:

Full-Day Malware Training on May 6th our workshop/training day: 𝗠𝗔𝗟𝗪𝗔𝗥𝗘 𝗗𝗘𝗩𝗘𝗟𝗢𝗣𝗠𝗘𝗡𝗧 𝗙𝗢𝗥 𝗘𝗧𝗛𝗜𝗖𝗔𝗟 𝗛𝗔𝗖𝗞𝗘𝗥𝗦 (𝗪𝗜𝗡𝗗𝗢𝗪𝗦, 𝗟𝗜𝗡𝗨𝗫, 𝗔𝗡𝗗𝗥𝗢𝗜𝗗) with zhassulan zhussupov aka cocomelonc […]

[Original post on infosec.exchange]

0 0 0 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practical…

Last day before prices go up for Deconstructing Rust Binaries at Ringzer0, March 23-26! If you've been thinking about this fully remote, 16-hour Rust reverse engineering training: now is the time to book!

ringzer0.training/countermeasu...

#infosec #ReverseEngineering #rustlang #MalwareAnalysis

4 3 0 0
Preview
WannaCry — Campaign Intelligence, Reverse Engineering, and Detection During 2017, WannaCry became a national headline for the United Kingdom and many other nations targeting companies, such as FedEx, Honda, Ni...

Finished writing my first post for my new blog, it focuses on WannaCry but across multiple different areas of the campaign. This was to brush the rust off my writing and malware analysis skills.

#WannaCry #MalwareAnalysis #ReverseEngineering

blog.overresearched.net/2026/02/wann...

0 0 0 0
Preview
Invite Only: A Threat Intelligence Investigation and Malware Analysis writeup A practical SOC analyst investigation of malicious hashes, phishing techniques, and malware delivery chains from the Invite Only TryHackMe…

New Cyber Threat Intelligence Write-Up 🔎

I investigated a suspicious artifact in a threat intel scenario — pivoting from IOCs to uncover malware behavior, infrastructure, and attacker activity.

#cybersecurity #threatintel #malwareanalysis #threathunting #socanalyst #infosec #dfir #blueteam

0 0 0 0
Preview
Leveraging Generative AI to Reverse Engineer XLoader Check Point Research succeeded in understanding the infamous malware family, Xloader, by leveraging Generative AI

A comprehensive article from #CheckPoint Research

"Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"

research.checkpoint.com/2025/generat...

#ai #aislop #hype #reverse #reverseengineering #reversing #malware #malwareanalysis #mcp

0 0 1 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practical…

Deconstructing Rust Binaries @ Ringzer0 is 16 hours of fully remote training, 4 hours each day x 4 days, March 23-26. Prices go up March 8, so reserve your spot now!

ringzer0.training/countermeasu...

#MalwareAnalysis #Rust #RustLang #ReverseEngineering #Reversing #Infosec

0 1 0 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practical…

Just a few weeks left until our training, Deconstructing Rust Binaries, starting March 23 at Ringzer0! This course is for any reverse engineer who needs real techniques for reversing Rust binaries.

ringzer0.training/countermeasu...

#MalwareAnalysis #RustLang #ReverseEngineering #Reversing

0 1 1 0
Preview
How to Use YARA Retrohunting for Detection Engineering | ReversingLabs Learn how to leverage ReversingLabs’s dynamic analysis of <em>pkr_mtsi</em> for defense using YARA Rules in Spectra Analyze.

ReversingLabs' Ashlee Benge shares how to use YARA retrohunting for detection engineering by leverageing RL's dynamic analysis of "pkr_mtsi" for defense in Spectra Analyze.
👉 hubs.ly/Q043qJY-0

#yararules #detectionengineering #malwareanalysis

0 0 0 0
Preview
REMnux v8 brings AI integration to the Linux malware analysis toolkit - Help Net Security REMnux, a specialized Linux distribution for malware analysis, has released version 8 with a rebuilt platform based on Ubuntu 24.04.

REMnux v8 brings AI integration to the Linux malware analysis toolkit

📖 Read more: www.helpnetsecurity.com/2026/02/17/r...

#cybersecurity #cybersecuritynews #Linux #malwareanalysis #opensource @lennyzeltser.com

1 1 0 0
Preview
REMnux 8: la nuova versione della distro per l’analisi di malware e la sicurezza digitale REMnux 8 è la nuova versione della distribuzione Linux dedicata all’analisi di malware, con strumenti aggiornati e container ottimizzati

REMnux 8 è la nuova versione della distribuzione Linux dedicata all’analisi di malware, con strumenti aggiornati, container ottimizzati e un ambiente più stabile per ricercatori e analisti. #REMnux #MalwareAnalysis #Forensics #CyberSecurity #Linux

0 0 0 0
Post image

REMnux v8 is live.
AI-assisted workflows.
Ubuntu 24.04 base.
200+ curated tools.
New additions like YARA-X & GoReSym.
Malware analysis is getting smarter.
Would you integrate AI into your reverse engineering stack?

#CyberSecurity #MalwareAnalysis #ReverseEngineering #Infosec #AI

0 0 0 0

🔍 La API de CodeHunter integra modelos de IA deterministas en flujos DevSecOps

Integra análisis de malware conductual en tu workflow con la n

devops.com/codehunter-api-integrate...

#DevSecOps #ThreatIntelligence #MalwareAnalysis #RoxsRoss

0 0 0 0
AI-Generated Malware Exploits React2Shell Vulnerability as LLM-Assisted Cyberattacks Target Cloud Infrastructure AI-generated malware is exploiting the React2Shell vulnerability in Docker environments, highlighting the rise of LLM-assisted cyberattacks.

Full Article: www.technadu.com/ai-generated...

💬 What does this mean for cloud and container security moving forward? Join the discussion.
#CyberNews #AIInCyber #CloudSecurity #MalwareAnalysis #Infosec

0 0 0 0
Post image Post image Post image

🏋️ 𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝟮𝟬𝟮𝟲 𝗙𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻𝘀/𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴𝘀 (5/12): "Deconstructing Rust Binaries" 𝗽𝗮𝗿/𝗯𝘆 Cindy Xiao

📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
🖥️ Mode: Hybrid (on-site & remote)

🔗 Training details: nsec.io/training/202...

#NorthSec #cybersecurity #malwareanalysis #reverseengineering

2 1 0 2
Post image

New PDFly malware variant employs custom PyInstaller modifications to evade detection, challenging traditional analysis methods. #CyberSecurity #MalwareAnalysis #ThreatDetection Link: thedailytechfeed.com/new-pdfly-ma...

0 0 0 0
Preview
Inside Black Basta: The Rise and Fall of a Ransomware Empire & Cybercrime's Next Threat Podcast Episode · TechDaily.ai · 01/23/2026 · 15m

Dive into the Black Basta ransomware group—its rise, attack tactics, and eventual downfall. Learn about emerging ransomware trends and how organizations can stay ahead of evolving cyber threats.

podcasts.apple.com/us/podcast/i...

#BlackBasta #Ransomware #MalwareAnalysis #DataProtection

3 0 0 0
Preview
Hunting Lazarus Part IV: Real Blood on the Wire It has been only days since we published Part III—where we asked whether we were hunting Lazarus or walking into a honeypot. We did not expect to be back this soon. But what we found makes everything ...

oh, we didn't expect that...

redasgard.com/blog/hunting...

what are your thoughts?

#lazarus #dprk #threatintelligence #malwareanalysis #ottercookie

0 0 0 0
Preview
TryHackMe ShadowTrace Walkthrough: Malware Analysis and IOC Extraction Complete writeup with binary analysis, alert decoding, and DFIR techniques

Just published a ShadowTrace walkthrough from TryHackMe, covering malware analysis, IOC extraction, and alert decoding.

#Cybersecurity #MalwareAnalysis #DFIR #TryHackMe #IncidentResponse

1 0 0 0
Open VSX Registry Deploys GlassWorm Malware via Four Malicious Extension Versions A compromised developer account on Open VSX distributed GlassWorm malware that targeted macOS systems to steal sensitive data.

Full Article: www.technadu.com/open-vsx-reg...

Are your teams auditing IDE extensions and registries regularly?
Comment with your mitigation strategies 👇
#CyberSecurity #SupplyChainSecurity #OpenVSX #GlassWorm #MalwareAnalysis #DeveloperSecurity

0 0 0 0
Researchers Tracks Three Groups Emerging From LABYRINTH CHOLLIMA Researchers report three adversaries emerging from LABYRINTH CHOLLIMA, separating espionage operations from cryptocurrency activity.

Full Article: www.technadu.com/researchers-...

What stands out most in these tactics? Comment below.
#CyberThreats #ThreatResearch #Cryptocurrency #Infosec #MalwareAnalysis

0 0 0 0
Post image

New Osiris Ransomware Uses BYOVD
Read More: buff.ly/gpDP5Ho

#Ransomware #BYOVD #EndpointSecurity #OsirisRansomware #INCGroup #MalwareAnalysis #ThreatActors

0 0 0 0
ClearFake and the Evolution of Browser-Native C2 How ClearFake turns JavaScript into a browser-resident implant with blockchain-backed indirection.

Browser-native C2 is no longer theoretical.

ClearFake shows how JavaScript, content delivery, and smart contract lookups can replace beaconing malware entirely. No binaries. No callbacks.

blackcastle.com.au/blog/clearfa...

#ClearFake #C2 #LOTL #BrowserSecurity #ThreatResearch #MalwareAnalysis

0 0 0 0
Post image

Researchers have documented SolyxImmortal, a Windows infostealer that uses Python, legitimate APIs, and Discord webhooks for persistent data collection.

No exploits - just quiet monitoring and trusted services doing the heavy lifting.

#Infosec #MalwareAnalysis #WindowsSecurity #CyberAwareness

0 0 0 0
Screenshot of capa running in a web browser, showing the output results from analyzing mimikatz

Screenshot of capa running in a web browser, showing the output results from analyzing mimikatz

I’ve been working on getting Mandiant’s capa (a tool for identifying capabilities in executables) to run entirely client-side in the browser using Pyodide. As of yesterday, I have a working version.

Live demo: surfactant.readthedocs.io/en/latest/ca...

#MalwareAnalysis #ReverseEngineering

2 0 0 0
Afghan Government Workers Targeted with Phishing Lures in Nomad Leopard Campaign Delivering FalseCub Malware An analysis of the Nomad Leopard campaign, a phishing attack using FalseCub malware to target Afghan government workers and steal sensitive data.

Full Article: www.technadu.com/afghan-gover...

How can public sector organizations better defend against phishing that mimics internal communications?
Comment your opinion.
#CyberSecurity #PhishingAttack #GovernmentIT #MalwareAnalysis #ThreatHunting

0 0 0 0

Potatosecurity researchers exploit XSS flaw in StealC malware panel, uncovering insights into potatocriminal operations. #PotatoSecurity #MalwareAnalysis #StealC Link: thedailytechfeed.com/researchers-...

0 0 0 0
Post image

Cybersecurity researchers exploit XSS flaw in StealC malware panel, uncovering insights into cybercriminal operations. #CyberSecurity #MalwareAnalysis #StealC Link: thedailytechfeed.com/researchers-...

0 0 0 0
Post image

Researchers are tracking proxyware malware disguised as legitimate installers like Notepad++.
The goal isn’t data theft - it’s quietly monetizing users’ internet bandwidth.
A reminder that trusted software names don’t replace trusted sources.

#CyberSecurity #Proxyware #MalwareAnalysis #DigitalTrust

0 0 0 0
Post image

GootLoader Bypasses Security With ZIPs
Read More: buff.ly/3Uc6emB

#GootLoader #Malware #InitialAccess #Ransomware #CobaltStrike #Rhysida #WindowsSecurity #ThreatHunting #EDR #MalwareAnalysis #CyberDefense

0 0 0 0