Advertisement ยท 728 ร— 90
#
Hashtag
#MalwareAnalysis
Advertisement ยท 728 ร— 90
Preview
Elastic Security Labs uncovers BRUSHWORM and BRUSHLOGGER Elastic Security Labs discovered two custom tools deployed against a South Asian financial institution: BRUSHWORM, a modular backdoor that establishes persistence, downloads plugins, spreads via USB, and steals a broad set of file types; and BRUSHLOGGER, a DLL side-loading keylogger that captures system-wide keystrokes with window context and writes XOR-encrypted logs. Analysis found scheduled-task persistence, C2 communication to resources.dawnnewsisl[.]com/updtdll, AES/XOR handling of configuration and logs, and multiple iterative testing builds on VirusTotal, indicating an inexperienced or still-developing author. #BRUSHWORM #BRUSHLOGGER

Elastic Security Labs uncovered BRUSHWORM, a modular backdoor spreading via USB and stealing files, and BRUSHLOGGER, an XOR-encoded DLL side-loading keylogger targeting a South Asian financial institution. #MalwareAnalysis #SouthAsia #Backdoor

0 0 0 0
Talos Releases DispatchLogger Tool

~Talos~
Cisco Talos released DispatchLogger, an open-source tool providing deep visibility into script-based malware via transparent COM proxy interception.
-
IOCs: (None identified)
-
#DispatchLogger #MalwareAnalysis #ThreatIntel

1 0 0 0
Preview
Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis The article describes a serial, multi-agent pipeline that treats each reverse-engineering tool (radare2, Ghidra, Binary Ninja, IDA Pro) as an independent, skeptical analyst to cross-validate findings and reject decompiler artifacts and parsing errors before report synthesis. It also explains why deterministic bridge scripts were chosen over the Model Context Protocol to reduce latency, non-determinism, and token costs, and documents token economics, tiered model allocation, and operational lessons from early runs. #WizardUpdate #SysJoker

A multi-agent LLM pipeline treats radare2, Ghidra, Binary Ninja, and IDA Pro as skeptical analysts to cross-validate malware analysis results, reducing errors and decompiler artifacts using deterministic bridge scripts. #MalwareAnalysis #AutomationTech

0 0 0 0
Video

๐ŸŽฏ New #BSidesLuxembourg2026 Session Reveal!

A Phishing Trip with Fancy Bear โ€“ Analyze APT28 Malware Together! (2h Workshop) with ๐— ๐—”๐—ฅ๐—œ๐—จ๐—ฆ ๐—š๐—˜๐—ก๐—›๐—˜๐—œ๐— ๐—˜๐—ฅ

Join this beginner-friendly 2h workshop to walk through a real Fancy Bear (APT28) attack chain: targeted [โ€ฆ]

[Original post on infosec.exchange]

0 1 0 0
Post image

Coruna artifact analysis, breaking down the traces, technical clues, and the wider implications behind the campaign.

blackcastle.com.au/blog/coruna-...

#CyberSecurity #ThreatIntelligence #MalwareAnalysis #Infosec #APT #DFIR #CyberResearch #Coruna #exploit #Reverse-engineering

0 0 0 0
Post image Post image Post image Post image

From a memory forensics workshop I attended and completed #RAMAnalysis #Volatility #MalwareAnalysis #ThreatHunting #DFIR #CTF

0 0 0 0
Post image

๐ŸŒŸ Welcome to Another hashtag#BSidesLuxembourg2026 Highlight!

Training announcement:

Full-Day Malware Training on May 6th our workshop/training day: ๐— ๐—”๐—Ÿ๐—ช๐—”๐—ฅ๐—˜ ๐——๐—˜๐—ฉ๐—˜๐—Ÿ๐—ข๐—ฃ๐— ๐—˜๐—ก๐—ง ๐—™๐—ข๐—ฅ ๐—˜๐—ง๐—›๐—œ๐—–๐—”๐—Ÿ ๐—›๐—”๐—–๐—ž๐—˜๐—ฅ๐—ฆ (๐—ช๐—œ๐—ก๐——๐—ข๐—ช๐—ฆ, ๐—Ÿ๐—œ๐—ก๐—จ๐—ซ, ๐—”๐—ก๐——๐—ฅ๐—ข๐—œ๐——) with zhassulan zhussupov aka cocomelonc [โ€ฆ]

[Original post on infosec.exchange]

0 0 0 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practicalโ€ฆ

Last day before prices go up for Deconstructing Rust Binaries at Ringzer0, March 23-26! If you've been thinking about this fully remote, 16-hour Rust reverse engineering training: now is the time to book!

ringzer0.training/countermeasu...

#infosec #ReverseEngineering #rustlang #MalwareAnalysis

4 3 0 0
Preview
WannaCry โ€” Campaign Intelligence, Reverse Engineering, and Detection During 2017, WannaCry became a national headline for the United Kingdom and many other nations targeting companies, such as FedEx, Honda, Ni...

Finished writing my first post for my new blog, it focuses on WannaCry but across multiple different areas of the campaign. This was to brush the rust off my writing and malware analysis skills.

#WannaCry #MalwareAnalysis #ReverseEngineering

blog.overresearched.net/2026/02/wann...

0 0 0 0
Preview
Invite Only: A Threat Intelligence Investigation and Malware Analysis writeup A practical SOC analyst investigation of malicious hashes, phishing techniques, and malware delivery chains from the Invite Only TryHackMeโ€ฆ

New Cyber Threat Intelligence Write-Up ๐Ÿ”Ž

I investigated a suspicious artifact in a threat intel scenario โ€” pivoting from IOCs to uncover malware behavior, infrastructure, and attacker activity.

#cybersecurity #threatintel #malwareanalysis #threathunting #socanalyst #infosec #dfir #blueteam

0 0 0 0
Preview
Leveraging Generative AI to Reverse Engineer XLoader Check Point Research succeeded in understanding the infamous malware family, Xloader, by leveraging Generative AI

A comprehensive article from #CheckPoint Research

"Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"

research.checkpoint.com/2025/generat...

#ai #aislop #hype #reverse #reverseengineering #reversing #malware #malwareanalysis #mcp

0 0 1 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practicalโ€ฆ

Deconstructing Rust Binaries @ Ringzer0 is 16 hours of fully remote training, 4 hours each day x 4 days, March 23-26. Prices go up March 8, so reserve your spot now!

ringzer0.training/countermeasu...

#MalwareAnalysis #Rust #RustLang #ReverseEngineering #Reversing #Infosec

0 1 0 0
Preview
Deconstructing Rust Binaries Deconstructing Rust Binaries is the first comprehensive training course focused solely on reverse engineering Rust binaries. This course is for any reverse engineer who needs a rapid, practicalโ€ฆ

Just a few weeks left until our training, Deconstructing Rust Binaries, starting March 23 at Ringzer0! This course is for any reverse engineer who needs real techniques for reversing Rust binaries.

ringzer0.training/countermeasu...

#MalwareAnalysis #RustLang #ReverseEngineering #Reversing

0 1 1 0
Preview
How to Use YARA Retrohunting for Detection Engineering | ReversingLabs Learn how to leverage ReversingLabsโ€™s dynamic analysis of <em>pkr_mtsi</em> for defense using YARA Rules in Spectra Analyze.

ReversingLabs' Ashlee Benge shares how to use YARA retrohunting for detection engineering by leverageing RL's dynamic analysis of "pkr_mtsi" for defense in Spectra Analyze.
๐Ÿ‘‰ hubs.ly/Q043qJY-0

#yararules #detectionengineering #malwareanalysis

0 0 0 0
Preview
REMnux v8 brings AI integration to the Linux malware analysis toolkit - Help Net Security REMnux, a specialized Linux distribution for malware analysis, has released version 8 with a rebuilt platform based on Ubuntu 24.04.

REMnux v8 brings AI integration to the Linux malware analysis toolkit

๐Ÿ“– Read more: www.helpnetsecurity.com/2026/02/17/r...

#cybersecurity #cybersecuritynews #Linux #malwareanalysis #opensource @lennyzeltser.com

1 1 0 0
Preview
REMnux 8: la nuova versione della distro per lโ€™analisi di malware e la sicurezzaย digitale REMnux 8 รจ la nuova versione della distribuzione Linux dedicata allโ€™analisi di malware, con strumenti aggiornati e container ottimizzati

REMnux 8 รจ la nuova versione della distribuzione Linux dedicata allโ€™analisi di malware, con strumenti aggiornati, container ottimizzati e un ambiente piรน stabile per ricercatori e analisti. #REMnux #MalwareAnalysis #Forensics #CyberSecurity #Linux

0 0 0 0
Post image

REMnux v8 is live.
AI-assisted workflows.
Ubuntu 24.04 base.
200+ curated tools.
New additions like YARA-X & GoReSym.
Malware analysis is getting smarter.
Would you integrate AI into your reverse engineering stack?

#CyberSecurity #MalwareAnalysis #ReverseEngineering #Infosec #AI

0 0 0 0

๐Ÿ” La API de CodeHunter integra modelos de IA deterministas en flujos DevSecOps

Integra anรกlisis de malware conductual en tu workflow con la n

devops.com/codehunter-api-integrate...

#DevSecOps #ThreatIntelligence #MalwareAnalysis #RoxsRoss

0 0 0 0
AI-Generated Malware Exploits React2Shell Vulnerability as LLM-Assisted Cyberattacks Target Cloud Infrastructure AI-generated malware is exploiting the React2Shell vulnerability in Docker environments, highlighting the rise of LLM-assisted cyberattacks.

Full Article: www.technadu.com/ai-generated...

๐Ÿ’ฌ What does this mean for cloud and container security moving forward? Join the discussion.
#CyberNews #AIInCyber #CloudSecurity #MalwareAnalysis #Infosec

0 0 0 0
Post image Post image Post image

๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ (5/12): "Deconstructing Rust Binaries" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Cindy Xiao

๐Ÿ“… Dates: May 11, 12 and 13, 2026 (3 days)
๐Ÿ“Š Difficulty: Medium
๐Ÿ–ฅ๏ธ Mode: Hybrid (on-site & remote)

๐Ÿ”— Training details: nsec.io/training/202...

#NorthSec #cybersecurity #malwareanalysis #reverseengineering

2 1 0 2
Post image

New PDFly malware variant employs custom PyInstaller modifications to evade detection, challenging traditional analysis methods. #CyberSecurity #MalwareAnalysis #ThreatDetection Link: thedailytechfeed.com/new-pdfly-ma...

0 0 0 0
Preview
Inside Black Basta: The Rise and Fall of a Ransomware Empire & Cybercrime's Next Threat Podcast Episode ยท TechDaily.ai ยท 01/23/2026 ยท 15m

Dive into the Black Basta ransomware groupโ€”its rise, attack tactics, and eventual downfall. Learn about emerging ransomware trends and how organizations can stay ahead of evolving cyber threats.

podcasts.apple.com/us/podcast/i...

#BlackBasta #Ransomware #MalwareAnalysis #DataProtection

3 0 0 0
Preview
Hunting Lazarus Part IV: Real Blood on the Wire It has been only days since we published Part IIIโ€”where we asked whether we were hunting Lazarus or walking into a honeypot. We did not expect to be back this soon. But what we found makes everything ...

oh, we didn't expect that...

redasgard.com/blog/hunting...

what are your thoughts?

#lazarus #dprk #threatintelligence #malwareanalysis #ottercookie

0 0 0 0
Preview
TryHackMe ShadowTrace Walkthrough: Malware Analysis and IOC Extraction Complete writeup with binary analysis, alert decoding, and DFIR techniques

Just published a ShadowTrace walkthrough from TryHackMe, covering malware analysis, IOC extraction, and alert decoding.

#Cybersecurity #MalwareAnalysis #DFIR #TryHackMe #IncidentResponse

1 0 0 0
Open VSX Registry Deploys GlassWorm Malware via Four Malicious Extension Versions A compromised developer account on Open VSX distributed GlassWorm malware that targeted macOS systems to steal sensitive data.

Full Article: www.technadu.com/open-vsx-reg...

Are your teams auditing IDE extensions and registries regularly?
Comment with your mitigation strategies ๐Ÿ‘‡
#CyberSecurity #SupplyChainSecurity #OpenVSX #GlassWorm #MalwareAnalysis #DeveloperSecurity

0 0 0 0
Researchers Tracks Three Groups Emerging From LABYRINTH CHOLLIMA Researchers report three adversaries emerging from LABYRINTH CHOLLIMA, separating espionage operations from cryptocurrency activity.

Full Article: www.technadu.com/researchers-...

What stands out most in these tactics? Comment below.
#CyberThreats #ThreatResearch #Cryptocurrency #Infosec #MalwareAnalysis

0 0 0 0
Post image

New Osiris Ransomware Uses BYOVD
Read More: buff.ly/gpDP5Ho

#Ransomware #BYOVD #EndpointSecurity #OsirisRansomware #INCGroup #MalwareAnalysis #ThreatActors

0 0 0 0
ClearFake and the Evolution of Browser-Native C2 How ClearFake turns JavaScript into a browser-resident implant with blockchain-backed indirection.

Browser-native C2 is no longer theoretical.

ClearFake shows how JavaScript, content delivery, and smart contract lookups can replace beaconing malware entirely. No binaries. No callbacks.

blackcastle.com.au/blog/clearfa...

#ClearFake #C2 #LOTL #BrowserSecurity #ThreatResearch #MalwareAnalysis

0 0 0 0
Post image

Researchers have documented SolyxImmortal, a Windows infostealer that uses Python, legitimate APIs, and Discord webhooks for persistent data collection.

No exploits - just quiet monitoring and trusted services doing the heavy lifting.

#Infosec #MalwareAnalysis #WindowsSecurity #CyberAwareness

0 0 0 0
Screenshot of capa running in a web browser, showing the output results from analyzing mimikatz

Screenshot of capa running in a web browser, showing the output results from analyzing mimikatz

Iโ€™ve been working on getting Mandiantโ€™s capa (a tool for identifying capabilities in executables) to run entirely client-side in the browser using Pyodide. As of yesterday, I have a working version.

Live demo: surfactant.readthedocs.io/en/latest/ca...

#MalwareAnalysis #ReverseEngineering

2 0 0 0