New Video: Build your own LLM dynamic analysis lab 🦔🎥
➡️ AI debugs and unpacks with x64dbg
➡️ AI can access powershell terminal
www.youtube.com/watch?v=QrWz...
Posts by Drew
Thanks!
Can the links be made clickable?
burn baby burn
Wild story on a big AI-powered social engineering campaign, leveraging Device Code phishing to steal Entra ID/Microsoft accounts -- all with entirely unique and personalized per-victim lures from vibecode-crafted infrastructure 🤯 Video: youtu.be/9b3kirR8s2U
Breathing issues but no drinking issues lol
Hope things are well
I wrote an article about SugarSMP Minecraft scams, Spark stealer, extortion and hacked accounts.
After a brief contact to the threat actor, we talked to two victims and followed the trail.
Analysis in collaboration with @rifteyy
#GDATATechblog #GDATA
blog.gdatasoftware.com/2026/03/3839...
🤓 A month ago I published a blog post on how to monitor Claude Code sessions using hooks and NOVA Protector!
At the time, no one was really talking about this. Coding agents were being handed full access to your machine and people were just trusting the output blindly.
The post covers how I […]
Unreal you’re still alive, Godspeed!
Need a status update on this modus operandi on how this worked out
In the movies you’ll get hacked every time
New post out! "The Red Queen’s Race: Arms Race Dynamics in Threat Detection"
medium.com/@koifsec/the...
I appreciate your intelligent responses and candor, well done
IMO it’s often used as a generic catch all title for those who wear a lot of hats in their jobs such as threat research, malware analysis, detection engineering, etc.
You are hitting it hard this week, well done!
Wait, AI can’t replace that right?
On this episode of Discarded, our team explores how #artificialintelligence is shaping modern #malware analysis and detection workflows.
Listen now on your favorite #podcast platform, and you'll get a balanced view of AI's growing impact on cybersecurity.
🎙️: www.proofpoint.com/us/podcasts/...
🤓 Happy to see that my DEFCON talk on crypto money laundering and tracking techniques was featured in the DEFCON 33 Almanac!
Read it here: harris.uchicago.edu/sites/default/files/the_...
I started making comics, in part, as a respite from the grind that is cybersecurity.
Only hackers/scammers are everywhere. I’m no @johnhammond.bsky.social but here is my video on how scammers try to take advantage of creators on Kickstarter.
This looks very interesting! 👇
Episode 2 of Breach Log is now available! Special thanks to Max Margolis for joining me and telling his story.
If you have a story you'd like to share, get in contact and we can have some fun! breachlogpodcast [@] gmail[.]com
open.spotify.com/episode/4SDz...
🤓 Let me introduce you to MoltThreats: The first AI Threat Intel Feed for Ai Agents!
In one week, OpenClaw became a widely used general AI agent. People started to run their own agents all over the world and connect them directly to the internet.
But this […]
[Original post on infosec.exchange]
You do an amazing job of staying on top of all these things!
Nothing says optimal workout recovery like cream cheese
2026-01-31 (Friday): I've posted a new traffic analysis exercise. It's Lumma in the room-ah! Join the fun at www.malware-traffic-analysis.net/2026/01/31/i...
I mean, this guy looks like he's having fun.
yolo
Screenshot from an infected Windows host showing Remcos RAT and how it is persistent.
2026-01-22 (Thursday): #RemcosRAT infection persistent on an infected Windows host. This was caused by #ClickFix instructions from #SmartApeSG through a fake CAPTCHA page. Details of this #Remcos #RAT infection are available at www.malware-traffic-analysis.net/2026/01/06/i...
I've released my new course:
Practical Threat Hunting for Beginners
Similar courses: $$$$
This course: $$
academy.bluraven.io/course/pract...
#ThreatHunting #DetectionEngineering
🦔 📹 New Video: Can office files be malicious without Macros?
➡️ VSTO Add-Ins
➡️ External Templates
➡️ Checklist for Office analysis
#MalwareAnalysisForHedgehogs
www.youtube.com/watch?v=RtHH...