 
                        
                The 13th Annual Volatility Plugin Contest is Open!
                We are excited to announce that the Volatility Plugin Contestย is officially open for submissions! The annual Plugin Contest is your opportunity to: Directly contribute to the open source forensics โฆ
            
        
    
    
            The 13th annual @volatility #PluginContest is OPEN for submissions until 31 Dec 2025! 
This contest is designed to encourage research & development in the field of #memoryanalysis. Every year, contributions from all around the world continue to help build the next generation of #memoryforensics.
               
            
            
                29.10.2025 15:37 โ ๐ 1    ๐ 3    ๐ฌ 0    ๐ 0                      
            
         
            
        
            
            
            
            
                                                 
                                                
    
    
    
    
            -iOS 26 change deletes clues of old spyware infections
-Starlink disables 2.5k scam compound terminals
-Caribbean hospital still down 5 months after ransomware attack
-Poland charges officials in Pegasus scandal
Newsletter: news.risky.biz/risky-bullet...
Podcast: risky.biz/RBNEWS495/
               
            
            
                24.10.2025 07:18 โ ๐ 20    ๐ 11    ๐ฌ 1    ๐ 2                      
            
         
            
        
            
            
            
            
            
    
    
            
                             
                        
                โHacktivate: Capture the Flag
                โCrack codes. Break firewalls. Conquer the map.
Hacktivate is the ultimate cybersecurity challenge: a world map of 240 missions where every puzzle is built on real cybersecurity techniques hackers us...
            
        
    
    
            Today I'm launching my new app, Hacktivate. It teaches real-world computer science skills through 240 "capture the flag" challenges, and works on iPhone, iPad, and Mac with one purchase. I've poured a ton of love into it, and I'd love to hear what you think ๐  apps.apple.com/gb/app/hackt...
               
            
            
                22.10.2025 13:20 โ ๐ 153    ๐ 30    ๐ฌ 17    ๐ 0                      
            
         
            
        
            
            
                            
            
            
            
    
    
    
    
            I used PE-bear for the first time to dump an embedded binary. Its intuitive UI made extraction effortless. Because malware often embeds payloads with the form A in B to evade detection, pulling out the inner binary was crucial for deeper analysis and IoCs hunting.
               
            
            
                19.10.2025 08:45 โ ๐ 2    ๐ 2    ๐ฌ 2    ๐ 0                      
            
         
            
        
            
            
            
            
                                                 
                                                
    
    
    
    
            Finally done with #FlareOn12. What a ride! I am looking forward to read other peopleโs solutions, especially of those who did the 9th task quickly.
               
            
            
                11.10.2025 16:26 โ ๐ 9    ๐ 0    ๐ฌ 0    ๐ 0                      
            
         
            
        
            
            
            
            
                                                 
                                                
    
    
    
    
            #FTSCon Speaker Spotlight: Aleksandra Doniec (@hasherezade.bsky.social) is presenting โUncovering Malware's Secrets with TinyTracerโ in the MAKER track.
See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...
               
            
            
                18.09.2025 18:10 โ ๐ 2    ๐ 6    ๐ฌ 0    ๐ 0                      
            
         
            
        
            
        
            
            
            
            
            
    
    
    
    
            Beyond good olโ Run key, Part 148
www.hexacorn.com/blog/2025/07...
               
            
            
                05.07.2025 23:44 โ ๐ 5    ๐ 1    ๐ฌ 0    ๐ 0                      
            
         
            
        
            
            
            
            
                                                 
                                                
    
    
    
    
            - option of custom parsing exports directory allows to pinpoint even the APIs that the malware author tried to hide by erasing exports table in memory: (github.com/hasherezade/...)
               
            
            
                06.06.2025 19:18 โ ๐ 3    ๐ 0    ๐ฌ 0    ๐ 0                      
            
         
            
        
            
            
            
            
                                                 
                                                
    
    
    
    
            - watching not only the functions arguments, but also, how they changed after the function execution, and the function return value: (github.com/hasherezade/...) - thanks to a new contributor, maxspl:
               
            
            
                06.06.2025 19:17 โ ๐ 3    ๐ 0    ๐ฌ 1    ๐ 0                      
            
         
            
        
            
            
            
            
                                                 
                                                         
                                                
    
    
    
    
            includes: tracing defined local functions (github.com/hasherezade/...):
               
            
            
                06.06.2025 19:15 โ ๐ 0    ๐ 0    ๐ฌ 1    ๐ 0                      
            
         
            
        
            
            
            
            
                                                 
                                                
    
    
    
    
            New #TinyTracer (v3.0) is out - with many cool features: github.com/hasherezade/...  - check them out!
               
            
            
                06.06.2025 19:11 โ ๐ 16    ๐ 6    ๐ฌ 1    ๐ 0                      
            
         
            
        
            
            
            
            
            
    
    
    
    
            1. Pause thread midway in exploit races (even โช).
2. Or block entire CPU core. Kernel APCs run at APC_LEVEL (๐คฏ), so thread scheduling kinda disabled (think priority == โ).
3. Or build upon @hasherezade.bsky.social  work & generalize #WaitingThreadHijacking โ making it, in fact, Waitless.
               
            
            
                06.05.2025 22:06 โ ๐ 2    ๐ 1    ๐ฌ 0    ๐ 0                      
            
         
            
        
            
            
            
            
                                                 
                                            Screenshot of contextjail.exe running with default arguments.
Highlighted:
* prisoner thread (latched to CPU1 with priority 15) couldn't run for the entire test duration (30 seconds).
* 99 jailer threads (latched to 6/8 processors, CPU2..CPU7) were using 20% of total CPU time.
Overlay: pseudo-ASSCII art with prisoner thread and 6 jailer threads (guards), spamming NtGetContextThread to block the prisoner.
Source and compiled binary:
https://pastebin.com/pBJcGp1y
                                                
    
    
    
    
            Heard of #ContextJail?
It's a nasty new technique: puts target thread into โช deadloop, for as long as you can afford. Requires THREAD_GET_CONTEXT right.
The gist? Just spam NtGetContextThread(tgt).๐ธ
Target will be jailed, running nt!PspGetSetContextSpecialApc ๐.
Src & binary in [ALT].
Usecases: โคต๏ธ
               
            
            
                06.05.2025 22:06 โ ๐ 7    ๐ 6    ๐ฌ 1    ๐ 0                      
            
         
            
        
            
            
            
            
            
    
    
    
    
            yes, we catch it, but I cannot speak for others
               
            
            
                14.04.2025 18:59 โ ๐ 0    ๐ 0    ๐ฌ 0    ๐ 0                      
            
         
            
        
            
            
            
            
            
    
    
            
            
            
                YouTube video by hasherezade
                [DEMO] Waiting Thread Hijacking (on Windows 11 24 H2)
            
         
    
    
            demo: www.youtube.com/watch?v=CZIR... ; src: github.com/hasherezade/...
               
            
            
                14.04.2025 18:18 โ ๐ 5    ๐ 0    ๐ฌ 0    ๐ 0                      
            
         
            
        
            
        
            
            
            
            
            
    
    
    
    
            ๐ซ
               
            
            
                13.04.2025 21:57 โ ๐ 1    ๐ 0    ๐ฌ 0    ๐ 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                             
                        
                New HijackLoader Evasion Tactics | ThreatLabz
                Learn how HijackLoader has introduced call stack spoofing and new modules to improve its evasion and anti-analysis capabilities.
            
        
    
    
            Zscaler has published a technical report on HijackLoader (IDAT Loader, GhostPulse) and its recent changes, such as its new call stack spoofing module, anti-VM module, and support for scheduled task persistence
www.zscaler.com/blogs/securi...
               
            
            
                01.04.2025 10:31 โ ๐ 10    ๐ 4    ๐ฌ 1    ๐ 0                      
            
         
            
        
            
            
            
            
            
    
    
    
    
            Abolish April Foolโs day. Society has moved past the need for April Foolโs day
               
            
            
                01.04.2025 02:36 โ ๐ 13458    ๐ 1563    ๐ฌ 542    ๐ 169                      
            
         
            
        
            
            
            
            
            
    
    
            
                             
                        
                Hellcat Hacking Group Unmasked: Investigating Rey and Pryx | KELA Cyber
                KELAโs latest research uncovers key insights into two key threat actors of  Hellcat Group, Pryx and Rey. Read more.
            
        
    
    
            KELA has published a profile on Rey and Pryx, the two main individuals behind the Hellcat hacking group, responsible for several breaches over the past months, such as Schneider Electric, Telefรณnica, and Orange Romania.
www.kelacyber.com/blog/hellcat...
               
            
            
                27.03.2025 13:13 โ ๐ 8    ๐ 2    ๐ฌ 0    ๐ 0                      
            
         
            
        
            
            
            
            
            
    
    
            
                             
                        
                23andMe Files for Bankruptcy as CEO Anne Wojcicki Resigns โ What Will Happen to Your DNA Data?
                Genetics company 23andMe has filed for bankruptcy and its CEO is stepping down, leaving many users concerned about the future of their data.
            
        
    
    
            We all knew this day would arrive when the DNA samples you willingly provided 23andMe would be up for sale. Company now says it's seeking a buyer as it files for bankruptcy. 23andMe says any buyer will have to adhere to privacy laws for customer DNA/data they acquire.  people.com/23andme-file...
               
            
            
                24.03.2025 16:58 โ ๐ 81    ๐ 36    ๐ฌ 6    ๐ 9                      
            
         
            
        
            
        
            
        
            
        
            
            
            
            
                                                 
                                            table of contents for tmp.0ut volume 4
                                                
    
    
    
    
            Would you look at that, it's tmp.0ut Volume 4! Happy Friday, hope you enjoy this latest issue!
tmpout.sh/4/
               
            
            
                21.03.2025 16:26 โ ๐ 126    ๐ 66    ๐ฌ 2    ๐ 7                      
            
         
            
        
            
            
            
            
            
    
    
    
    
            Did anyone find the secret art page? ๐
               
            
            
                21.03.2025 20:13 โ ๐ 10    ๐ 3    ๐ฌ 2    ๐ 0                      
            
         
            
        
            
            
            
            
            
    
    
            
            
            
                Andrew starts his keynote with a journey into neuroscience and ends with a challenge for all reverse engineering tooling authors.Original Abstract:From RE//v...
                RE//verse 2025: What 20 Years of RE Practice and Tool Research Feels Like Itโs Done (Andrew Ruef)
            
         
    
    
            Next RE//verse video released! Andrew's Day 2 keynote was the next most requested video. It starts with an aside from neuroscience, ends with a challenge to all tool developers and has a fantastic journey between:
               
            
            
                21.03.2025 20:50 โ ๐ 3    ๐ 2    ๐ฌ 0    ๐ 0                      
            
         
            
        
            
            
            
            
                                                 
                                                
    
    
    
    
            whoever made this one, it is perfect for IT work or life in general.
               
            
            
                20.03.2025 08:29 โ ๐ 111    ๐ 15    ๐ฌ 5    ๐ 6                      
            
         
            
        
            
            
            
            
            
    
    
    
    
            Prodaft has published a technical analysis of Anubis, a new Python-based backdoor linked to Savage Ladybug (FIN7) operations
catalyst.prodaft.com/public/repor...
               
            
            
                16.03.2025 10:39 โ ๐ 8    ๐ 2    ๐ฌ 0    ๐ 0                      
            
         
    
         
        
            
        
                            
                    
                    
                                    
                            
                    
                    
                                            Director of Cybersecurity @eff.org 
Co-founder of @stopstalkerware.bsky.social 
These opinions are my own, not my employersโ 
I did a TED talk once
                                     
                            
                    
                    
                                            Linux Evangelist, Malwares , Security Enthusiast, Investor, Contrarian , Neurology , Philanthropist , Reformist ,Sigma female
                                     
                            
                    
                    
                                            Cybersecurity Researcher and Assist Prof in ฤVUT University. Machine Learning. AI. Detection with IDS/IPS in the network. Reinforcement Learning. Agents. Attacking/Defending. DNS. VPNs. Honeypots. Malware analysis.
                                     
                            
                    
                    
                                            Just someone that dabbles in threat research, malware analysis, RE, incident response, CTFs, and old school forensics.
Apologetic ginger.
                                     
                            
                    
                    
                                            Evolve or Die! 
Head of Vuln Research Lab at CUJO AI 
Volunteer at IoTVillage Hackersuli Meetup Hacktivity @zh4ck@infosec.exchange
NetRunner, Shaper
                                     
                            
                    
                    
                                    
                            
                    
                    
                                            Threat researcher at Trend Micro mostly focused on APT
                                     
                            
                    
                    
                                            RE and Malware Hunting and fancy projects I never finish :D
                                     
                            
                    
                    
                                            Senior TI Analyst @ MSTIC.
Former Senior RE @ FLARE.
                                     
                            
                    
                    
                                            0day Researcher @ โโโโโโโโโโโโ  / Baker / 0wl
// I post random things on here
                                     
                            
                    
                    
                                            Security ninja wannabe / board game geek / photon catcher
                                     
                            
                    
                    
                                            Security researcher/programmer โ Managing director @ HexArcana โ @DragonSectorCTF founder โ he/him
                                     
                            
                    
                    
                                            wannabe hacker... he/him
๐ฑ grow your hacking skills https://hextree.io
                                     
                            
                    
                    
                                            Real-time historian of the late cyber capitalist era @TechCrunch, writing about the intersection of hackers, human rights, and spies. 
๐, โฝ๏ธ, ๐ธ, ๐ฎ by night. 
โ๏ธ Signal: +1 917 257 1382
Past lives: VICE Motherboard, Mashable, WIRED.
                                     
                            
                    
                    
                                    
                            
                    
                    
                                    
                            
                    
                    
                                            Chief Scientist @Rapid7 (ex @McAfee) | @cloudsa | Co-author of @CyberGridBook & CSA Guide to Cloud | Advisor 
@EC3Europol
https://bsky.app/profile/rajsamani.bsky.social
                                     
                            
                    
                    
                                            Cybersecurity Specialist, Public Speaker, Ex-Hacker.
https://marcushutchins.com
                                     
                            
                    
                    
                                            Principal Adversary Hunter @dragosinc, Army Veteran,
Cocktail Scientist, APT Researcher | #FSD
https://infosec.exchange/web/@DrunkBinary
https://twitter.com/DrunkBinary