Advertisement · 728 × 90

Posts by pip0

Post image Post image

I have created a website, where you can share your sample analysis (via links or posts) and search samples for training based on tags and difficulty.

If you write analysis blogs, you can share them there.
samplepedia.cc

3 months ago 14 7 0 1
Post image

You can now pull Ghidra databases straight into your workflow in Binary Ninja 5.2! Open a .gbf on its own, import Ghidra data into an existing session, or bring parts of a full project into a Binary Ninja project on Commercial and above.

4 months ago 5 2 1 0
Post image

Members of Gen Digital Threat Labs uncover two new DPRK toolsets - Kimsuky’s HttpTroy backdoor and Lazarus’s upgraded BLINDINGCAN remote access tool - and explain how these tools work. www.gendigital.com/blog/insight...

5 months ago 1 1 0 0
Preview
The obfuscation game: MUT-9332 targets Solidity developers via malicious VS Code extensions | Datadog Security Labs Analysis of a threat actor campaign targeting Solidity developers via three malicious VS Code extensions

🚨 The obfuscation game: MUT-9332 targets Solidity developers via malicious VS Code extensions!

Deep dive analysis in this obfuscated campaign including (PowerShell & VBS scripts, PE malware, Malicious browser extensions even stegomalware)

Enjoy reading securitylabs.datadoghq.com/articles/mut...

11 months ago 2 2 0 0
Post image

Leaving SF right in time before all the AI diarrhea. Thank you Hack The Bay and Pacific Hackers for having me, I’ll be back next year.

11 months ago 1 0 0 0
Post image

Catch me speaking intelligence collection at scale today at HackTheBay #PHACK

11 months ago 1 0 0 0
Diagram showing an overview of the OUTLAW infection chain.

Diagram showing an overview of the OUTLAW infection chain.

Elastic Security Labs researchers report on Outlaw, a persistent yet unsophisticated auto-propagating Linux coinminer. Despite lacking stealth and advanced evasion techniques, it remains active and effective by leveraging simple but impactful tactics. www.elastic.co/security-lab...

1 year ago 2 1 0 0
Preview
How to Enter the US With Your Digital Privacy Intact Crossing into the United States has become increasingly dangerous for digital privacy. Here are a few steps you can take to minimize the risk of Customs and Border Patrol accessing your data.

Green card holders detained. A French researcher denied entry for anti-Trump messages. A new travel ban on 40+ countries coming.

Given all these encroachments on travelers' civil liberties, we've updated our guide to digital privacy while crossing US borders. www.wired.com/2017/02/guid...

1 year ago 981 499 26 43
Graphic showing relations between Moonstone Sleet and other subgroups

Graphic showing relations between Moonstone Sleet and other subgroups

JPCERT/CC's 佐々木 勇人 (Hayato Sasaki) looks into the practical challenges of attribution in the case of Lazarus’s subgroup. blogs.jpcert.or.jp/en/2025/03/c...

1 year ago 2 1 0 0
Advertisement

Both Wiz and Palo Alto Networks have found evidence that the compromise of the Changed-Files GitHub Action might have been a complex multi-tier supply chain attack targeting tools used by Coinbase developers

www.wiz.io/blog/new-git...

unit42.paloaltonetworks.com/github-actio...

1 year ago 23 5 0 1
Preview
GitHub - Zouuup/landrun: Run any Linux process in a secure, unprivileged sandbox using Landlock LSM. Think firejail, but lightweight, user-friendly, and baked into the kernel. Run any Linux process in a secure, unprivileged sandbox using Landlock LSM. Think firejail, but lightweight, user-friendly, and baked into the kernel. - Zouuup/landrun

AI and blockchain software expert Armin Ranjbar released Landrun, a lightweight, secure sandbox for running Linux processes

github.com/Zouuup/landrun

1 year ago 12 4 1 0
Preview
GitHub - Cryakl/Ultimate-RAT-Collection: For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots. For educational purposes only, exhaustive samples of 450+ classic/modern trojan builders including screenshots. - Cryakl/Ultimate-RAT-Collection

Someone has done an excellent job collecting RATs and documenting them by version. They also included images.

A+ work. This is amazing (we're going to ingest this eventually)

github.com/Cryakl/Ultim...

1 year ago 45 17 0 1
Post image

⚠️🧵 RL researchers have found 2 malicious #VSCode extensions, "ahban.shiba" & "ahban.cychelloworld," that deliver #ransomware in development to it's users. #Dev #SoftwareSupplyChainSecurity

1 year ago 8 9 1 0
Post image

Just over 600 GitHub repos were impacted by Changed-Files supply chain attack

www.endorlabs.com/learn/blast-...

1 year ago 7 3 0 1
Post image

Podcast: risky.biz/RBNEWS400/ (400, woohoo! 🎉)
Newsletter: risky.biz/risky-bullet...

-China says Taiwan's military is behind PoisonIvy APT
-Google buys Wiz for $32 billion
-11 APTs abuse a Windows zero-day
-Judge tells CISA to reinstate fired workers
-Supply-chain attack hits car dealership sites

1 year ago 20 9 3 0
Preview
EFF Border Search Pocket Guide border-pocket-guide-2.pdf

If you're critical of the US government and you are planning to cross the US border any time soon, today is a good day to review EFF's border search pocket guide: www.eff.org/document/eff...

1 year ago 2348 1437 64 72
Post image

-43% of WP vulns last year didn't require authentication to exploit
-96% of WP vulns impacted plugins
-22 new WP vulns published daily
-over 500k WP websites hacked last year

patchstack.com/whitepaper/s...

1 year ago 12 10 3 1
MalChela – A YARA and Malware Analysis Toolkit written in Rust Saturday was for Python. Sunday was for Rust. After my success with the Python + YARA + Hashing, I decided to take things to the next level. Over the past few years I've created a number of Python and PowerShell scripts related to YARA and Malware Analysis. What if I combined them into a single utility? While we're at it, let's rewrite them all from scratch in Rust.

Introducing MalChela. A YARA and Malware Analysis utility written in Rust. #DFIR #MalwareAnalysis #YARA #Hashing

1 year ago 7 3 0 0
Advertisement
Preview
An inside look at NSA (Equation Group) TTPs from China’s lense

Xintra founder Lina Lau has published a report that untangles and puts more clarity on how Chinese authorities claim the Equation Group (US NSA) hacked the Xi'an Northwestern Polytechnical University

www.inversecos.com/2025/02/an-i...

1 year ago 12 8 0 1
Sun Security Con SunSecCon

Agenda for SunSecCon is up www.sunseccon.org

1 year ago 0 0 0 0
Preview
Datadog threat roundup: top insights for Q4 2024 | Datadog Security Labs Threat insights from Datadog Security Labs for Q4 2024.

Threat insights from Datadog Security Labs for Q4 2024

securitylabs.datadoghq.com/articles/202...

1 year ago 5 5 0 0
Post image

Elastic Security Labs' Remco Sprooten & Ruben Groenewoud analyse PUMAKIT, a loadable kernel module (LKM) rootkit that employs advanced stealth mechanisms to hide its presence and maintain communication with command-and-control servers. www.elastic.co/security-lab...

1 year ago 0 1 0 0

Link? If you can.

1 year ago 0 0 1 0
Overview of the attack flow

Overview of the attack flow

Overview of how a large number of credentials were leaked

Overview of how a large number of credentials were leaked

Clusters of fake GitHub profiles

Clusters of fake GitHub profiles

Phishing e-mail

Phishing e-mail

New research: We've been monitoring a threat actor publishing dozens of trojanized GitHub repositories targeting threat actors, leaking hundreds of thousands of credentials along the way

securitylabs.datadoghq.com/articles/mut...

1 year ago 21 13 0 0
Preview
Introducing Supply-Chain Firewall: Protecting Developers from Malicious Open Source Packages | Datadog Security Labs Release of Supply-Chain Firewall, an open source tool for preventing the installation of malicious PyPI and npm packages

We are happy to introduce our latest tool "Supply Chain Firewall" 🎉 by @ikretz.bsky.social
The tool detects & prevents installation of malicious packages in local development environment.

Read more
securitylabs.datadoghq.com/articles/int...

And give it a try github.com/DataDog/supp...

1 year ago 11 7 0 0
Post image

Mistakes happen to everyone!

❤️ @binaryninja.bsky.social

1 year ago 1 0 0 0

Exclusive: The backdoor inserted in v1.95.7 adds an "addToQueue" function which exfiltrates the private key through seemingly-legitimate CloudFlare headers.

Calls to this function are then inserted in various places that (legitimately) access the private key.

1 year ago 49 32 3 2
Advertisement
Preview
Supply Chain Attack Detected in @solana/web3.js Library - So... A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular @solana/web3.js library.

🚨 A supply chain attack has been detected in versions 1.95.6 and 1.95.7 of the popular #Solana web3.js library. The injected code captures private keys and transmits them to a hardcoded address. This is a developing story. socket.dev/blog/supply-... #crypto #cybersecurity

1 year ago 14 8 0 3
Sun Security Con SunSecCon

PHACK, some friends and I are creating a Security track in the famous SCALE in LA (Pasadena). CFP is open and early birds tickets are for sale!

If your in LA come check us out! www.sunseccon.org www.phack.org www.socallinuxexpo.org/scale/22x

@socallinuxexpo.bsky.social #infosec

1 year ago 1 0 0 0

Sites that don’t let you copy/paste in the password field.

Let me try to type this 24 char (because the site doesn’t allow longer) randomly generated string.

Fail.

Reset password.

Let’s trying again…

1 year ago 1 0 0 0