From a memory forensics workshop I attended and completed #RAMAnalysis #Volatility #MalwareAnalysis #ThreatHunting #DFIR #CTF
🌟 Welcome to Another hashtag#BSidesLuxembourg2026 Highlight!
Training announcement:
Full-Day Malware Training on May 6th our workshop/training day: 𝗠𝗔𝗟𝗪𝗔𝗥𝗘 𝗗𝗘𝗩𝗘𝗟𝗢𝗣𝗠𝗘𝗡𝗧 𝗙𝗢𝗥 𝗘𝗧𝗛𝗜𝗖𝗔𝗟 𝗛𝗔𝗖𝗞𝗘𝗥𝗦 (𝗪𝗜𝗡𝗗𝗢𝗪𝗦, 𝗟𝗜𝗡𝗨𝗫, 𝗔𝗡𝗗𝗥𝗢𝗜𝗗) with zhassulan zhussupov aka cocomelonc […]
[Original post on infosec.exchange]
Last day before prices go up for Deconstructing Rust Binaries at Ringzer0, March 23-26! If you've been thinking about this fully remote, 16-hour Rust reverse engineering training: now is the time to book!
ringzer0.training/countermeasu...
#infosec #ReverseEngineering #rustlang #MalwareAnalysis
Finished writing my first post for my new blog, it focuses on WannaCry but across multiple different areas of the campaign. This was to brush the rust off my writing and malware analysis skills.
#WannaCry #MalwareAnalysis #ReverseEngineering
blog.overresearched.net/2026/02/wann...
New Cyber Threat Intelligence Write-Up 🔎
I investigated a suspicious artifact in a threat intel scenario — pivoting from IOCs to uncover malware behavior, infrastructure, and attacker activity.
#cybersecurity #threatintel #malwareanalysis #threathunting #socanalyst #infosec #dfir #blueteam
A comprehensive article from #CheckPoint Research
"Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"
research.checkpoint.com/2025/generat...
#ai #aislop #hype #reverse #reverseengineering #reversing #malware #malwareanalysis #mcp
Deconstructing Rust Binaries @ Ringzer0 is 16 hours of fully remote training, 4 hours each day x 4 days, March 23-26. Prices go up March 8, so reserve your spot now!
ringzer0.training/countermeasu...
#MalwareAnalysis #Rust #RustLang #ReverseEngineering #Reversing #Infosec
Just a few weeks left until our training, Deconstructing Rust Binaries, starting March 23 at Ringzer0! This course is for any reverse engineer who needs real techniques for reversing Rust binaries.
ringzer0.training/countermeasu...
#MalwareAnalysis #RustLang #ReverseEngineering #Reversing
ReversingLabs' Ashlee Benge shares how to use YARA retrohunting for detection engineering by leverageing RL's dynamic analysis of "pkr_mtsi" for defense in Spectra Analyze.
👉 hubs.ly/Q043qJY-0
#yararules #detectionengineering #malwareanalysis
REMnux v8 brings AI integration to the Linux malware analysis toolkit
📖 Read more: www.helpnetsecurity.com/2026/02/17/r...
#cybersecurity #cybersecuritynews #Linux #malwareanalysis #opensource @lennyzeltser.com
REMnux 8 è la nuova versione della distribuzione Linux dedicata all’analisi di malware, con strumenti aggiornati, container ottimizzati e un ambiente più stabile per ricercatori e analisti. #REMnux #MalwareAnalysis #Forensics #CyberSecurity #Linux
REMnux v8 is live.
AI-assisted workflows.
Ubuntu 24.04 base.
200+ curated tools.
New additions like YARA-X & GoReSym.
Malware analysis is getting smarter.
Would you integrate AI into your reverse engineering stack?
#CyberSecurity #MalwareAnalysis #ReverseEngineering #Infosec #AI
🔍 La API de CodeHunter integra modelos de IA deterministas en flujos DevSecOps
Integra análisis de malware conductual en tu workflow con la n
devops.com/codehunter-api-integrate...
#DevSecOps #ThreatIntelligence #MalwareAnalysis #RoxsRoss
Full Article: www.technadu.com/ai-generated...
💬 What does this mean for cloud and container security moving forward? Join the discussion.
#CyberNews #AIInCyber #CloudSecurity #MalwareAnalysis #Infosec
🏋️ 𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝟮𝟬𝟮𝟲 𝗙𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻𝘀/𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴𝘀 (5/12): "Deconstructing Rust Binaries" 𝗽𝗮𝗿/𝗯𝘆 Cindy Xiao
📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
🖥️ Mode: Hybrid (on-site & remote)
🔗 Training details: nsec.io/training/202...
#NorthSec #cybersecurity #malwareanalysis #reverseengineering
New PDFly malware variant employs custom PyInstaller modifications to evade detection, challenging traditional analysis methods. #CyberSecurity #MalwareAnalysis #ThreatDetection Link: thedailytechfeed.com/new-pdfly-ma...
Dive into the Black Basta ransomware group—its rise, attack tactics, and eventual downfall. Learn about emerging ransomware trends and how organizations can stay ahead of evolving cyber threats.
podcasts.apple.com/us/podcast/i...
#BlackBasta #Ransomware #MalwareAnalysis #DataProtection
oh, we didn't expect that...
redasgard.com/blog/hunting...
what are your thoughts?
#lazarus #dprk #threatintelligence #malwareanalysis #ottercookie
Just published a ShadowTrace walkthrough from TryHackMe, covering malware analysis, IOC extraction, and alert decoding.
#Cybersecurity #MalwareAnalysis #DFIR #TryHackMe #IncidentResponse
Full Article: www.technadu.com/open-vsx-reg...
Are your teams auditing IDE extensions and registries regularly?
Comment with your mitigation strategies 👇
#CyberSecurity #SupplyChainSecurity #OpenVSX #GlassWorm #MalwareAnalysis #DeveloperSecurity
Full Article: www.technadu.com/researchers-...
What stands out most in these tactics? Comment below.
#CyberThreats #ThreatResearch #Cryptocurrency #Infosec #MalwareAnalysis
New Osiris Ransomware Uses BYOVD
Read More: buff.ly/gpDP5Ho
#Ransomware #BYOVD #EndpointSecurity #OsirisRansomware #INCGroup #MalwareAnalysis #ThreatActors
Browser-native C2 is no longer theoretical.
ClearFake shows how JavaScript, content delivery, and smart contract lookups can replace beaconing malware entirely. No binaries. No callbacks.
blackcastle.com.au/blog/clearfa...
#ClearFake #C2 #LOTL #BrowserSecurity #ThreatResearch #MalwareAnalysis
Researchers have documented SolyxImmortal, a Windows infostealer that uses Python, legitimate APIs, and Discord webhooks for persistent data collection.
No exploits - just quiet monitoring and trusted services doing the heavy lifting.
#Infosec #MalwareAnalysis #WindowsSecurity #CyberAwareness
Screenshot of capa running in a web browser, showing the output results from analyzing mimikatz
I’ve been working on getting Mandiant’s capa (a tool for identifying capabilities in executables) to run entirely client-side in the browser using Pyodide. As of yesterday, I have a working version.
Live demo: surfactant.readthedocs.io/en/latest/ca...
#MalwareAnalysis #ReverseEngineering
Full Article: www.technadu.com/afghan-gover...
How can public sector organizations better defend against phishing that mimics internal communications?
Comment your opinion.
#CyberSecurity #PhishingAttack #GovernmentIT #MalwareAnalysis #ThreatHunting
Potatosecurity researchers exploit XSS flaw in StealC malware panel, uncovering insights into potatocriminal operations. #PotatoSecurity #MalwareAnalysis #StealC Link: thedailytechfeed.com/researchers-...
Cybersecurity researchers exploit XSS flaw in StealC malware panel, uncovering insights into cybercriminal operations. #CyberSecurity #MalwareAnalysis #StealC Link: thedailytechfeed.com/researchers-...
Researchers are tracking proxyware malware disguised as legitimate installers like Notepad++.
The goal isn’t data theft - it’s quietly monetizing users’ internet bandwidth.
A reminder that trusted software names don’t replace trusted sources.
#CyberSecurity #Proxyware #MalwareAnalysis #DigitalTrust
GootLoader Bypasses Security With ZIPs
Read More: buff.ly/3Uc6emB
#GootLoader #Malware #InitialAccess #Ransomware #CobaltStrike #Rhysida #WindowsSecurity #ThreatHunting #EDR #MalwareAnalysis #CyberDefense