How can we detect malicious documents exploiting CVE-2026-21509, the recent 0-day vulnerability in MS Office ?
I designed a YARA rule for this, which detects all the malicious files that have been reported.
To get the YARA rule and all the explanations: decalage.info/CVE-2026-215...
06.02.2026 09:14 β π 2 π 1 π¬ 0 π 0
YouTube video by MalwareAnalysisForHedgehogs
Malware Analysis - Malicious MS Office files without Macros
π¦ πΉ New Video: Can office files be malicious without Macros?
β‘οΈ VSTO Add-Ins
β‘οΈ External Templates
β‘οΈ Checklist for Office analysis
#MalwareAnalysisForHedgehogs
www.youtube.com/watch?v=RtHH...
25.01.2026 07:30 β π 6 π 4 π¬ 2 π 1
Virus Bulletin
Videos and papers from this year's @virusbtn.bsky.social in Berlin are now available online. Amazing conference and looking forward to the next one: www.youtube.com/@virusbtn
28.11.2025 06:47 β π 9 π 4 π¬ 1 π 0
There's some really big caveats to this. A thread.
05.11.2025 15:52 β π 157 π 74 π¬ 6 π 2
Using .LNK files as lolbins
www.hexacorn.com/blog/2025/10...
04.10.2025 21:00 β π 8 π 4 π¬ 1 π 0
hack.lu 2025
Hack.lu (and CTI summit) is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society. Itβs the ...
At hack.lu I gave a presentation about "How to better identify (weaponized) file formats":
- Why do we need to identify file formats accurately?
- Why can the current tools (libmagic, magika) sometimes be bypassed?
- How can we do better?
You can now see it here: youtu.be/Qp5GDh2sj6A
#HackLu
27.10.2025 16:18 β π 5 π 3 π¬ 0 π 0
Infosec/hacking videos recorded by Cooper (@Ministraitor)
Infosec/hacking videos recorded by Cooper (@Ministraitor)
I've put together a website which indexes all the recordings my rigs have made thus-far as well as those currently planned:
administraitor.video
(minimalist - I'm a mid-/backend dev! π)
08.11.2024 15:22 β π 16 π 9 π¬ 0 π 0
YouTube video by Cooper
How To Better Identify (Weaponized) File Formats With Ftguess - Philippe Lagadec
How To Better Identify (Weaponized) File Formats With Ftguess - Philippe Lagadec
youtu.be/Qp5GDh2sj6A
#HackLu
25.10.2025 21:57 β π 2 π 2 π¬ 0 π 0
hack.lu 2025
Hack.lu (and CTI summit) is an open convention/conference where people can discuss about computer security, privacy, information technology and its cultural/technical implication on society. Itβs the ...
This week I'm going to hack.lu, to give a presentation about file format identification:
Why do we need to identify file formats accurately?
Why can the current tools sometimes be bypassed, or make mistakes?
How can we do better?
2025.hack.lu/agenda/
Send me a DM if you'd like to meet there.
21.10.2025 08:01 β π 1 π 0 π¬ 0 π 0
I'm happy to share that LIEF 0.17.0 is out: lief.re/blog/2025-09...
15.09.2025 03:49 β π 12 π 5 π¬ 0 π 0
#ESETresearch has discovered #HybridPetya ransomware on VirusTotal: a UEFI-compatible copycat of the infamous Petya/NotPetya malware. HybridPetya is capable of bypassing UEFI Secure Boot on outdated systems. www.welivesecurity.com/en/eset-rese... 1/8
12.09.2025 09:02 β π 11 π 11 π¬ 1 π 0
#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/7
26.08.2025 15:37 β π 64 π 45 π¬ 2 π 14
How FIDO2 works, a technical deep dive β Michael Waterman
This explanation of Passkeys and FIDO2 is really good π
michaelwaterman.nl/2025/04/02/h...
04.05.2025 21:34 β π 11 π 4 π¬ 0 π 0
Malwoverview: First response tool for threat hunting - Help Net Security
Malwoverview is an open-source threat hunting tool designed for the initial triage of malware samples, URLs, IP addresses, domains, malware families,
Even though I've been away from the field for years, it's great to see that a simple tool that I initially launched in 2018 and with great collaborators (Artur Marzano, Corey Forman and Christian Clauss) has been used by so many professionals.
www.helpnetsecurity.com/2025/03/26/m...
#malware
26.03.2025 19:02 β π 3 π 1 π¬ 0 π 0
I made a Doom source port that runs within a PDF file.
PDFs support Javascript, so Emscripten is used to compile Doom to asm.js, which is then run within the PDF engine. Input/output is done by manipulating text input fields.
doompdf.pages.dev/doom.pdf
github.com/ading2210/do...
13.01.2025 04:16 β π 4122 π 1930 π¬ 72 π 221
The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:
exploitreversing.com/2025/01/08/m...
Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).
#malware
08.01.2025 16:45 β π 5 π 3 π¬ 0 π 0
Forget PSEXEC: DCOM Upload & Execute Backdoor
Join Deep Instinct Security Researcher Eliran Nissan as he exposes a powerful new DCOM lateral movement attack that remotely writes custom payloads to create an embedded backdoor.
New DCOM lateral movement technique discovered that bypasses traditional defenses. Unlike previous attacks relying on IDispatch interfaces, this method exploits undocumented COM interfaces within MSI, specifically targeting IMsiServer and IMsiCustomAction interfaces. 1/7
12.12.2024 00:00 β π 21 π 17 π¬ 2 π 0
Software Supply Chain Red Team. SourceCodeRED & SecureStack founder, dad, startup OG, snowboarder and hacker. Workin on GitHax tool in my spare time. github.com/6mile
@eastsidemccarty from the bird site.
Threat researcher at Trend Micro mostly focused on APT
phishing, maldocs, threat intel
Rust Reverse Engineering Training.
Modern programming languages require modern reverse engineers.
π https://decoderloop.com
π» https://github.com/decoderloop
π https://infosec.exchange/@decoderloop
πΌ https://linkedin.com/company/decoderloop/
I nudge people to care about privacy and security. CPO/DPO. Privacy/infosec lawyer. Hacker. Fighting for privacy, digital civil liberties & the users. Ex @EA @FTC |my views are my own. I used to post on Twitter at @wbm312.
Red Brain, Blue Fingers
Malware Analysis, Reverse Engineering, Threat Hunting, Detection Engineering, DFIR, Security Research, Programming, Curiosities, Software Archaeology, Puzzles, Bad dad jokes
https://www.hexacorn.com/blog/
hexacorn@infosec.exchange
Malwarist,Threat Huntist and pythonist / core dev of #yeti/ member of @ProjectHoneynet/ co-organizer #BotConf / researcher at @GroupeESIEA
Dutch software dev who spends his free time travelling all over the place to film a whole bunch of (mostly) security conferences.
cybersecurity weather man. scanning the horizons for cloudy cyber. Expert at nothing except computer rubbish. Anti-ransomware since 2015.
Security research and breaking news straight from ESET Research Labs.
welivesecurity.com/research/
NorthSec β A community-run cybersecurity event offering world-class talks, trainings & a 48-hour, on-site capture-the-flag competition. Every May in MontrΓ©al since 2013 π¨π¦ Publications en franΓ§ais et en anglais.
https://nsec.io/
your daily dose of bunnies βΈ(ο½‘Λ α΅ Λ )βΈβ‘
https://x.com/malwrhunterteam | https://id-ransomware.malwarehunterteam.com/
#CTF 100% beurre salΓ©.
Ouvert à tous, mais les places sont très prisées !
#BreizhCTF2025
Discord β‘οΈ http://discord.gg/ckaT65Qsfg