LummaStealer resurfaced post-2025 disruption by using rapid hosting migration, alternative loaders like ClickFix, and pairing with CastleLoader for in-memory execution and strong obfuscation. #MalwareAnalysis #InMemoryThreat #USA
Latest posts tagged with #MalwareAnalysis on Bluesky
LummaStealer resurfaced post-2025 disruption by using rapid hosting migration, alternative loaders like ClickFix, and pairing with CastleLoader for in-memory execution and strong obfuscation. #MalwareAnalysis #InMemoryThreat #USA
🔗 blog.lobsec.com/2026...
#Cybersecurity #DevSecOps #MalwareAnalysis #npm #InfoSec #ThreatHunting
BSides Luxembourg talk announcement!
🐧🚨 𝗡𝗢𝗧 𝗦𝗢 𝗛𝗔𝗥𝗠𝗟𝗘𝗦𝗦: 𝗧𝗛𝗘 𝗛𝗜𝗗𝗗𝗘𝗡 𝗪𝗢𝗥𝗟𝗗 𝗢𝗙 𝗟𝗜𝗡𝗨𝗫 𝗣𝗔𝗖𝗞𝗘𝗥𝗦 𝗔𝗡𝗗 𝗗𝗘𝗧𝗘𝗖𝗧𝗜𝗢𝗡 𝗖𝗛𝗔𝗟𝗟𝗘𝗡𝗚𝗘𝗦 - 𝗠𝗔𝗦𝗦𝗜𝗠𝗢 𝗕𝗘𝗥𝗧𝗢𝗖𝗖𝗛𝗜 🛡️🔍
Linux packers and loaders are a sneaky blind spot in cybersecurity. They hide code with encryption and obfuscation […]
[Original post on infosec.exchange]
Xloader, evolved from FormBook, now features advanced obfuscation with runtime decryption, multi-layer RC4 encryption, decoy C2 IPs, and HTTP commands to exfiltrate credentials and deploy secondary payloads. #Xloader #Encryption #MalwareAnalysis
Picus highlights 11 top ATT&CK techniques and notable threats from 2025, including STATICPLUGIN, SadBridge Loader, XLoader variants, APT36, and Kubernetes cryptojacking with 147 network IoCs analyzed. #ThreatActors #MalwareAnalysis #APT36
RationalEdge #REDS new release: Maliciousness #Score, #AI Assisted Full Sample Analysis, and a new #Behaviour Panel.
rationaledge.io/blog/malicio...
@rationaledge.bsky.social
#ThreatResearch #ThreatIntel #CTI #Malware #MalwareAnalysis #ReverseEngineering 1/4
This is 3 full days of the first comprehensive course focused solely on reverse engineering Rust binaries, using real Rust malware as practice. Save your spot now! nsec.io/training/202...
#rust #rustlang #ReverseEngineering #MalwareAnalysis #malware #infosec
ResokerRAT leverages Telegram Bot API for stealthy remote access, enabling commands like /screenshot and /download via hidden PowerShell and registry tweaks to maintain persistence and evade detection. #RemoteAccess #TelegramBots #MalwareAnalysis
Elastic Security Labs uncovered BRUSHWORM, a modular backdoor spreading via USB and stealing files, and BRUSHLOGGER, an XOR-encoded DLL side-loading keylogger targeting a South Asian financial institution. #MalwareAnalysis #SouthAsia #Backdoor
~Talos~
Cisco Talos released DispatchLogger, an open-source tool providing deep visibility into script-based malware via transparent COM proxy interception.
-
IOCs: (None identified)
-
#DispatchLogger #MalwareAnalysis #ThreatIntel
A multi-agent LLM pipeline treats radare2, Ghidra, Binary Ninja, and IDA Pro as skeptical analysts to cross-validate malware analysis results, reducing errors and decompiler artifacts using deterministic bridge scripts. #MalwareAnalysis #AutomationTech
🎯 New #BSidesLuxembourg2026 Session Reveal!
A Phishing Trip with Fancy Bear – Analyze APT28 Malware Together! (2h Workshop) with 𝗠𝗔𝗥𝗜𝗨𝗦 𝗚𝗘𝗡𝗛𝗘𝗜𝗠𝗘𝗥
Join this beginner-friendly 2h workshop to walk through a real Fancy Bear (APT28) attack chain: targeted […]
[Original post on infosec.exchange]
Coruna artifact analysis, breaking down the traces, technical clues, and the wider implications behind the campaign.
blackcastle.com.au/blog/coruna-...
#CyberSecurity #ThreatIntelligence #MalwareAnalysis #Infosec #APT #DFIR #CyberResearch #Coruna #exploit #Reverse-engineering
From a memory forensics workshop I attended and completed #RAMAnalysis #Volatility #MalwareAnalysis #ThreatHunting #DFIR #CTF
🌟 Welcome to Another hashtag#BSidesLuxembourg2026 Highlight!
Training announcement:
Full-Day Malware Training on May 6th our workshop/training day: 𝗠𝗔𝗟𝗪𝗔𝗥𝗘 𝗗𝗘𝗩𝗘𝗟𝗢𝗣𝗠𝗘𝗡𝗧 𝗙𝗢𝗥 𝗘𝗧𝗛𝗜𝗖𝗔𝗟 𝗛𝗔𝗖𝗞𝗘𝗥𝗦 (𝗪𝗜𝗡𝗗𝗢𝗪𝗦, 𝗟𝗜𝗡𝗨𝗫, 𝗔𝗡𝗗𝗥𝗢𝗜𝗗) with zhassulan zhussupov aka cocomelonc […]
[Original post on infosec.exchange]
Last day before prices go up for Deconstructing Rust Binaries at Ringzer0, March 23-26! If you've been thinking about this fully remote, 16-hour Rust reverse engineering training: now is the time to book!
ringzer0.training/countermeasu...
#infosec #ReverseEngineering #rustlang #MalwareAnalysis
Finished writing my first post for my new blog, it focuses on WannaCry but across multiple different areas of the campaign. This was to brush the rust off my writing and malware analysis skills.
#WannaCry #MalwareAnalysis #ReverseEngineering
blog.overresearched.net/2026/02/wann...
New Cyber Threat Intelligence Write-Up 🔎
I investigated a suspicious artifact in a threat intel scenario — pivoting from IOCs to uncover malware behavior, infrastructure, and attacker activity.
#cybersecurity #threatintel #malwareanalysis #threathunting #socanalyst #infosec #dfir #blueteam
A comprehensive article from #CheckPoint Research
"Beating XLoader at Speed: Generative AI as a Force Multiplier for Reverse Engineering"
research.checkpoint.com/2025/generat...
#ai #aislop #hype #reverse #reverseengineering #reversing #malware #malwareanalysis #mcp
Deconstructing Rust Binaries @ Ringzer0 is 16 hours of fully remote training, 4 hours each day x 4 days, March 23-26. Prices go up March 8, so reserve your spot now!
ringzer0.training/countermeasu...
#MalwareAnalysis #Rust #RustLang #ReverseEngineering #Reversing #Infosec
Just a few weeks left until our training, Deconstructing Rust Binaries, starting March 23 at Ringzer0! This course is for any reverse engineer who needs real techniques for reversing Rust binaries.
ringzer0.training/countermeasu...
#MalwareAnalysis #RustLang #ReverseEngineering #Reversing
ReversingLabs' Ashlee Benge shares how to use YARA retrohunting for detection engineering by leverageing RL's dynamic analysis of "pkr_mtsi" for defense in Spectra Analyze.
👉 hubs.ly/Q043qJY-0
#yararules #detectionengineering #malwareanalysis
REMnux v8 brings AI integration to the Linux malware analysis toolkit
📖 Read more: www.helpnetsecurity.com/2026/02/17/r...
#cybersecurity #cybersecuritynews #Linux #malwareanalysis #opensource @lennyzeltser.com
REMnux 8 è la nuova versione della distribuzione Linux dedicata all’analisi di malware, con strumenti aggiornati, container ottimizzati e un ambiente più stabile per ricercatori e analisti. #REMnux #MalwareAnalysis #Forensics #CyberSecurity #Linux
REMnux v8 is live.
AI-assisted workflows.
Ubuntu 24.04 base.
200+ curated tools.
New additions like YARA-X & GoReSym.
Malware analysis is getting smarter.
Would you integrate AI into your reverse engineering stack?
#CyberSecurity #MalwareAnalysis #ReverseEngineering #Infosec #AI
🔍 La API de CodeHunter integra modelos de IA deterministas en flujos DevSecOps
Integra análisis de malware conductual en tu workflow con la n
devops.com/codehunter-api-integrate...
#DevSecOps #ThreatIntelligence #MalwareAnalysis #RoxsRoss
Full Article: www.technadu.com/ai-generated...
💬 What does this mean for cloud and container security moving forward? Join the discussion.
#CyberNews #AIInCyber #CloudSecurity #MalwareAnalysis #Infosec
🏋️ 𝗡𝗼𝗿𝘁𝗵𝗦𝗲𝗰 𝟮𝟬𝟮𝟲 𝗙𝗼𝗿𝗺𝗮𝘁𝗶𝗼𝗻𝘀/𝗧𝗿𝗮𝗶𝗻𝗶𝗻𝗴𝘀 (5/12): "Deconstructing Rust Binaries" 𝗽𝗮𝗿/𝗯𝘆 Cindy Xiao
📅 Dates: May 11, 12 and 13, 2026 (3 days)
📊 Difficulty: Medium
🖥️ Mode: Hybrid (on-site & remote)
🔗 Training details: nsec.io/training/202...
#NorthSec #cybersecurity #malwareanalysis #reverseengineering
New PDFly malware variant employs custom PyInstaller modifications to evade detection, challenging traditional analysis methods. #CyberSecurity #MalwareAnalysis #ThreatDetection Link: thedailytechfeed.com/new-pdfly-ma...
Dive into the Black Basta ransomware group—its rise, attack tactics, and eventual downfall. Learn about emerging ransomware trends and how organizations can stay ahead of evolving cyber threats.
podcasts.apple.com/us/podcast/i...
#BlackBasta #Ransomware #MalwareAnalysis #DataProtection