BSides Luxembourg talk announcement!
๐ง๐จ ๐ก๐ข๐ง ๐ฆ๐ข ๐๐๐ฅ๐ ๐๐๐ฆ๐ฆ: ๐ง๐๐ ๐๐๐๐๐๐ก ๐ช๐ข๐ฅ๐๐ ๐ข๐ ๐๐๐ก๐จ๐ซ ๐ฃ๐๐๐๐๐ฅ๐ฆ ๐๐ก๐ ๐๐๐ง๐๐๐ง๐๐ข๐ก ๐๐๐๐๐๐๐ก๐๐๐ฆ - ๐ ๐๐ฆ๐ฆ๐๐ ๐ข ๐๐๐ฅ๐ง๐ข๐๐๐๐ ๐ก๏ธ๐
Linux packers and loaders are a sneaky blind spot in cybersecurity. They hide code with encryption and obfuscation [โฆ]
[Original post on infosec.exchange]
Xloader, evolved from FormBook, now features advanced obfuscation with runtime decryption, multi-layer RC4 encryption, decoy C2 IPs, and HTTP commands to exfiltrate credentials and deploy secondary payloads. #Xloader #Encryption #MalwareAnalysis
Picus highlights 11 top ATT&CK techniques and notable threats from 2025, including STATICPLUGIN, SadBridge Loader, XLoader variants, APT36, and Kubernetes cryptojacking with 147 network IoCs analyzed. #ThreatActors #MalwareAnalysis #APT36
RationalEdge #REDS new release: Maliciousness #Score, #AI Assisted Full Sample Analysis, and a new #Behaviour Panel.
rationaledge.io/blog/malicio...
@rationaledge.bsky.social
#ThreatResearch #ThreatIntel #CTI #Malware #MalwareAnalysis #ReverseEngineering 1/4
This is 3 full days of the first comprehensive course focused solely on reverse engineering Rust binaries, using real Rust malware as practice. Save your spot now! nsec.io/training/202...
#rust #rustlang #ReverseEngineering #MalwareAnalysis #malware #infosec
ResokerRAT leverages Telegram Bot API for stealthy remote access, enabling commands like /screenshot and /download via hidden PowerShell and registry tweaks to maintain persistence and evade detection. #RemoteAccess #TelegramBots #MalwareAnalysis
Elastic Security Labs uncovered BRUSHWORM, a modular backdoor spreading via USB and stealing files, and BRUSHLOGGER, an XOR-encoded DLL side-loading keylogger targeting a South Asian financial institution. #MalwareAnalysis #SouthAsia #Backdoor
~Talos~
Cisco Talos released DispatchLogger, an open-source tool providing deep visibility into script-based malware via transparent COM proxy interception.
-
IOCs: (None identified)
-
#DispatchLogger #MalwareAnalysis #ThreatIntel
A multi-agent LLM pipeline treats radare2, Ghidra, Binary Ninja, and IDA Pro as skeptical analysts to cross-validate malware analysis results, reducing errors and decompiler artifacts using deterministic bridge scripts. #MalwareAnalysis #AutomationTech
๐ฏ New #BSidesLuxembourg2026 Session Reveal!
A Phishing Trip with Fancy Bear โ Analyze APT28 Malware Together! (2h Workshop) with ๐ ๐๐ฅ๐๐จ๐ฆ ๐๐๐ก๐๐๐๐ ๐๐ฅ
Join this beginner-friendly 2h workshop to walk through a real Fancy Bear (APT28) attack chain: targeted [โฆ]
[Original post on infosec.exchange]
Coruna artifact analysis, breaking down the traces, technical clues, and the wider implications behind the campaign.
blackcastle.com.au/blog/coruna-...
#CyberSecurity #ThreatIntelligence #MalwareAnalysis #Infosec #APT #DFIR #CyberResearch #Coruna #exploit #Reverse-engineering
From a memory forensics workshop I attended and completed #RAMAnalysis #Volatility #MalwareAnalysis #ThreatHunting #DFIR #CTF
๐ Welcome to Another hashtag#BSidesLuxembourg2026 Highlight!
Training announcement:
Full-Day Malware Training on May 6th our workshop/training day: ๐ ๐๐๐ช๐๐ฅ๐ ๐๐๐ฉ๐๐๐ข๐ฃ๐ ๐๐ก๐ง ๐๐ข๐ฅ ๐๐ง๐๐๐๐๐ ๐๐๐๐๐๐ฅ๐ฆ (๐ช๐๐ก๐๐ข๐ช๐ฆ, ๐๐๐ก๐จ๐ซ, ๐๐ก๐๐ฅ๐ข๐๐) with zhassulan zhussupov aka cocomelonc [โฆ]
[Original post on infosec.exchange]
Last day before prices go up for Deconstructing Rust Binaries at Ringzer0, March 23-26! If you've been thinking about this fully remote, 16-hour Rust reverse engineering training: now is the time to book!
ringzer0.training/countermeasu...
#infosec #ReverseEngineering #rustlang #MalwareAnalysis
Finished writing my first post for my new blog, it focuses on WannaCry but across multiple different areas of the campaign. This was to brush the rust off my writing and malware analysis skills.
#WannaCry #MalwareAnalysis #ReverseEngineering
blog.overresearched.net/2026/02/wann...
New Cyber Threat Intelligence Write-Up ๐
I investigated a suspicious artifact in a threat intel scenario โ pivoting from IOCs to uncover malware behavior, infrastructure, and attacker activity.
#cybersecurity #threatintel #malwareanalysis #threathunting #socanalyst #infosec #dfir #blueteam
A comprehensive article from #CheckPoint Research
"Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"
research.checkpoint.com/2025/generat...
#ai #aislop #hype #reverse #reverseengineering #reversing #malware #malwareanalysis #mcp
Deconstructing Rust Binaries @ Ringzer0 is 16 hours of fully remote training, 4 hours each day x 4 days, March 23-26. Prices go up March 8, so reserve your spot now!
ringzer0.training/countermeasu...
#MalwareAnalysis #Rust #RustLang #ReverseEngineering #Reversing #Infosec
Just a few weeks left until our training, Deconstructing Rust Binaries, starting March 23 at Ringzer0! This course is for any reverse engineer who needs real techniques for reversing Rust binaries.
ringzer0.training/countermeasu...
#MalwareAnalysis #RustLang #ReverseEngineering #Reversing
ReversingLabs' Ashlee Benge shares how to use YARA retrohunting for detection engineering by leverageing RL's dynamic analysis of "pkr_mtsi" for defense in Spectra Analyze.
๐ hubs.ly/Q043qJY-0
#yararules #detectionengineering #malwareanalysis
REMnux v8 brings AI integration to the Linux malware analysis toolkit
๐ Read more: www.helpnetsecurity.com/2026/02/17/r...
#cybersecurity #cybersecuritynews #Linux #malwareanalysis #opensource @lennyzeltser.com
REMnux 8 รจ la nuova versione della distribuzione Linux dedicata allโanalisi di malware, con strumenti aggiornati, container ottimizzati e un ambiente piรน stabile per ricercatori e analisti. #REMnux #MalwareAnalysis #Forensics #CyberSecurity #Linux
REMnux v8 is live.
AI-assisted workflows.
Ubuntu 24.04 base.
200+ curated tools.
New additions like YARA-X & GoReSym.
Malware analysis is getting smarter.
Would you integrate AI into your reverse engineering stack?
#CyberSecurity #MalwareAnalysis #ReverseEngineering #Infosec #AI
๐ La API de CodeHunter integra modelos de IA deterministas en flujos DevSecOps
Integra anรกlisis de malware conductual en tu workflow con la n
devops.com/codehunter-api-integrate...
#DevSecOps #ThreatIntelligence #MalwareAnalysis #RoxsRoss
Full Article: www.technadu.com/ai-generated...
๐ฌ What does this mean for cloud and container security moving forward? Join the discussion.
#CyberNews #AIInCyber #CloudSecurity #MalwareAnalysis #Infosec
๐๏ธ ๐ก๐ผ๐ฟ๐๐ต๐ฆ๐ฒ๐ฐ ๐ฎ๐ฌ๐ฎ๐ฒ ๐๐ผ๐ฟ๐บ๐ฎ๐๐ถ๐ผ๐ป๐/๐ง๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด๐ (5/12): "Deconstructing Rust Binaries" ๐ฝ๐ฎ๐ฟ/๐ฏ๐ Cindy Xiao
๐
Dates: May 11, 12 and 13, 2026 (3 days)
๐ Difficulty: Medium
๐ฅ๏ธ Mode: Hybrid (on-site & remote)
๐ Training details: nsec.io/training/202...
#NorthSec #cybersecurity #malwareanalysis #reverseengineering
New PDFly malware variant employs custom PyInstaller modifications to evade detection, challenging traditional analysis methods. #CyberSecurity #MalwareAnalysis #ThreatDetection Link: thedailytechfeed.com/new-pdfly-ma...
Dive into the Black Basta ransomware groupโits rise, attack tactics, and eventual downfall. Learn about emerging ransomware trends and how organizations can stay ahead of evolving cyber threats.
podcasts.apple.com/us/podcast/i...
#BlackBasta #Ransomware #MalwareAnalysis #DataProtection
oh, we didn't expect that...
redasgard.com/blog/hunting...
what are your thoughts?
#lazarus #dprk #threatintelligence #malwareanalysis #ottercookie
Just published a ShadowTrace walkthrough from TryHackMe, covering malware analysis, IOC extraction, and alert decoding.
#Cybersecurity #MalwareAnalysis #DFIR #TryHackMe #IncidentResponse