Memory-only malware leaves no trace on the file system and is commonly used by threat actors ranging from criminal organizations to ransomware operators to APT groups. In our Volatility 3 training, students gain deep hands on experience analyzing such threats:
memoryanalysis.net/courses-malw...
Posts by tlansec
High five to everyone who has suffered from anxiety, burnout, and depression without even once stealing 0-days from their employer and selling them to the Russians. www.zetter-zeroday.com/trenchant-ex...
@revrrlewis I've played over 1,000 hours of Civilization VI. Here's how Ukraine can defeat Russia. (1/47) Anthony Smith - 2h Replying to @revrrlewis one game of Civ VI and you think you're an expert????
The complete and utter failure of the metaverse is a reminder [...] that quite often these oligarchs quite simply cannot relate to real people, don’t know how or why people use their products, and very often have no idea what they’re doing www.404media.co/rip-metavers...
📣 #PIVOTcon26 Agenda is here 🤟 We are thrilled to announce the lineup for this year's edition!
2⃣ days and 19 talks from leading #ThreatResearch experts.
The agenda link is in the first comment👇, and the talks and speakers are in the thread.🧵
#CTI #ThreatIntel
1/15
@volexity.com recently released GoResolver v1.4, bringing significant updates to our #opensource tool for recovering symbol data from obfuscated Go binaries. This release is available on GitHub: github.com/volexity/GoR... [1/8]
This is a bad take. You can’t counter far right narratives on a platform that is designed to amplify only those narratives. Politicians should set the example.
And journalist should get off of it too.
SOS returns to Brussels on October 22, 2026!
As the geopolitical landscape rifts, hybrid threats continue to adapt & evolve. We provide a forum for observers of state-aligned sabotage, espionage, and more to share research with an action-oriented community.
Stay tuned for more announcements!
It's like F1 but with people instead of cars.
We’re just normal men
Reminder that the #PIVOTcon2026 CFP closes this Friday, February 6. Get those papers in. We want to see you at @pivotcon.bsky.social in Malaga! 😎
You say "Security Feature Bypass"... I say.... "Remote Code Execution":
msrc.microsoft.com/update-guide...
For folks looking for Notepad++ IoCs, @rapid7.com just dropped a write-up. www.rapid7.com/blog/post/tr...
#apt #unk via VT
BULLETEN_H.doc 7c396677848776f9824ebe408bbba943
1291.doc d47261e52335b516a777da368208ee91
Courses.doc 2f7b4dca1c79e525aef8da537294a6c4
Consultation_Topics_Ukraine(Final).doc 95e59536455a089ced64f5af2539a449
freefoodaid[.]com wellnessmedcare[.]org
A++
I promise you. I absolutely guarantee. You are not ready for what happens when you click this link. ovu.moe
WHAT?!?
LABYRINTHM CHOLLIMA is evolving!
Congratulations
Your LABYRINTH CHOLLIMA evolved into LABYRINTH CHOLLIMA!
That parameter is also a palindrome and does the same thing in reverse!
github.com/VirusTotal/y... - 1.11.0 is out! Lots of new features, modules and bug fixes. Read the release notes and congrats to Victor and the contributors!
Microsoft is so fucking stupid.
Microsoft renamed Microsoft Office to Microsoft 365 Copilot App
I'm not joking
Volexity Volcano Server & Volcano One v25.12.18 adds 300+ YARA rules, full parsing of Windows prefetch and Linux cron jobs, inline syscall hooking detection, and 5-level page table support. [1/3]
Narrator Voice: And so thousands of infosec people looking for relevance and attention logged into VirusTotal looking for samples uploaded from Venezuela in the last year.
finally, we're living through precedented times
Some phishers have taken inspiration from Russian cyber-espionage group UTA0355 and are using a technique that tricks users into sharing their OAuth material in a web page (UAT0355 did it via email replies)
pushsecurity.com/blog/consent...
everyone in the uk, internally hears: _OH DARLING HOLD MY HAND_
A study in the evolution of SVR cyberespionage tradecraft
@volexity.com tracks a variety of threat actors abusing Device Code & OAuth authentication workflows to phish credentials, which continue to see success due to creative social engineering. Our latest blog post details Russian threat actor UTA0355’s campaigns impersonating European security events.
On the plus side, everytime there's a Cloudflare outage 1000s of threat actors around the world have their malware C2 go down for a few hours.
I don't work for Insikit group.