Advertisement · 728 × 90

Posts by Drew

Build your own AI based Dynamic Reversing Lab, x64dbg automate
Build your own AI based Dynamic Reversing Lab, x64dbg automate YouTube video by MalwareAnalysisForHedgehogs

New Video: Build your own LLM dynamic analysis lab 🦔🎥

➡️ AI debugs and unpacks with x64dbg
➡️ AI can access powershell terminal

www.youtube.com/watch?v=QrWz...

2 days ago 2 1 0 0

Thanks!

3 days ago 0 0 0 0

Can the links be made clickable?

3 days ago 0 0 1 0

burn baby burn

1 week ago 1 0 0 0
Post image

Wild story on a big AI-powered social engineering campaign, leveraging Device Code phishing to steal Entra ID/Microsoft accounts -- all with entirely unique and personalized per-victim lures from vibecode-crafted infrastructure 🤯 Video: youtu.be/9b3kirR8s2U

1 week ago 2 3 0 0

Breathing issues but no drinking issues lol

4 weeks ago 1 0 1 0

Hope things are well

4 weeks ago 1 0 1 0
Preview
Minecraft: SugarSMP's Dark Tale of Scams, Malware & Extortion Some Minecraft players were looking for safe haven away from griefers, but found an elaborate web of malware, deception and extortion.

I wrote an article about SugarSMP Minecraft scams, Spark stealer, extortion and hacked accounts.

After a brief contact to the threat actor, we talked to two victims and followed the trail.

Analysis in collaboration with @rifteyy
#GDATATechblog #GDATA
blog.gdatasoftware.com/2026/03/3839...

1 month ago 2 3 0 0
Original post on infosec.exchange

🤓 A month ago I published a blog post on how to monitor Claude Code sessions using hooks and NOVA Protector!

At the time, no one was really talking about this. Coding agents were being handed full access to your machine and people were just trusting the output blindly.

The post covers how I […]

1 month ago 2 2 1 0

Unreal you’re still alive, Godspeed!

1 month ago 1 0 1 0
Advertisement

Need a status update on this modus operandi on how this worked out

1 month ago 1 0 1 0

In the movies you’ll get hacked every time

1 month ago 1 0 0 0
Preview
The Red Queen’s Race: Arms Race Dynamics in Threat Detection “Now, here, you see, it takes all the running you can do, to keep in the same place.” — The Red Queen, Through the Looking-Glass

New post out! "The Red Queen’s Race: Arms Race Dynamics in Threat Detection"
medium.com/@koifsec/the...

1 month ago 1 1 0 0

I appreciate your intelligent responses and candor, well done

1 month ago 0 0 0 0

IMO it’s often used as a generic catch all title for those who wear a lot of hats in their jobs such as threat research, malware analysis, detection engineering, etc.

1 month ago 1 0 0 0

You are hitting it hard this week, well done!

1 month ago 1 0 0 0

Wait, AI can’t replace that right?

1 month ago 1 0 1 0
Post image

On this episode of Discarded, our team explores how #artificialintelligence is shaping modern #malware analysis and detection workflows.

Listen now on your favorite #podcast platform, and you'll get a balanced view of AI's growing impact on cybersecurity.

🎙️: www.proofpoint.com/us/podcasts/...

1 month ago 2 1 0 0
Post image Post image

🤓 Happy to see that my DEFCON talk on crypto money laundering and tracking techniques was featured in the DEFCON 33 Almanac!

Read it here: harris.uchicago.edu/sites/default/files/the_...

2 months ago 2 1 0 0
Advertisement

I started making comics, in part, as a respite from the grind that is cybersecurity.

Only hackers/scammers are everywhere. I’m no @johnhammond.bsky.social but here is my video on how scammers try to take advantage of creators on Kickstarter.

2 months ago 3 4 0 0

This looks very interesting! 👇

2 months ago 0 0 0 0
Spotify – Web Player

Episode 2 of Breach Log is now available! Special thanks to Max Margolis for joining me and telling his story.
If you have a story you'd like to share, get in contact and we can have some fun! breachlogpodcast [@] gmail[.]com
open.spotify.com/episode/4SDz...

2 months ago 1 1 0 0
Post image

🤓 Let me introduce you to MoltThreats: The first AI Threat Intel Feed for Ai Agents!

In one week, OpenClaw became a widely used general AI agent. People started to run their own agents all over the world and connect them directly to the internet.

But this […]

[Original post on infosec.exchange]

2 months ago 3 1 1 1

You do an amazing job of staying on top of all these things!

2 months ago 0 0 0 0

Nothing says optimal workout recovery like cream cheese

2 months ago 1 0 0 0
Post image

2026-01-31 (Friday): I've posted a new traffic analysis exercise. It's Lumma in the room-ah! Join the fun at www.malware-traffic-analysis.net/2026/01/31/i...

I mean, this guy looks like he's having fun.

2 months ago 5 3 0 0

yolo

2 months ago 1 0 0 0
Advertisement
Screenshot from an infected Windows host showing Remcos RAT and how it is persistent.

Screenshot from an infected Windows host showing Remcos RAT and how it is persistent.

2026-01-22 (Thursday): #RemcosRAT infection persistent on an infected Windows host. This was caused by #ClickFix instructions from #SmartApeSG through a fake CAPTCHA page. Details of this #Remcos #RAT infection are available at www.malware-traffic-analysis.net/2026/01/06/i...

2 months ago 3 2 0 0
Preview
Practical Threat Hunting for Beginners Learn the core knowledge and practical skills required to perform effective threat hunting in real-world environments.

I've released my new course:
Practical Threat Hunting for Beginners

Similar courses: $$$$
This course: $$

academy.bluraven.io/course/pract...

#ThreatHunting #DetectionEngineering

2 months ago 3 2 0 0
Malware Analysis - Malicious MS Office files without Macros
Malware Analysis - Malicious MS Office files without Macros YouTube video by MalwareAnalysisForHedgehogs

🦔 📹 New Video: Can office files be malicious without Macros?

➡️ VSTO Add-Ins
➡️ External Templates
➡️ Checklist for Office analysis
#MalwareAnalysisForHedgehogs
www.youtube.com/watch?v=RtHH...

2 months ago 6 4 2 1