@tlansec.bsky.social
Threat Intel @volexity.com n stuff. London, UK.
β° The inaugural SOS conference is 30 days away! Have you gotten your ticket yet?!?
Listen to expert discussions on state-sponsored operations covering espionage, sabotage, and attribution of Russia, China, Iran, and more.
Registration is still open! stateofstatecraft.com/agenda
www.zscaler.com/blogs/securi... - Nice writeup by zscaler on some COLDRIVER malware. I'm talking about this stuff at #FTSCon in a few weeks and will have lots more details there.
26.09.2025 14:45 β π 7 π 4 π¬ 0 π 0First public report at Recorded Future by yours truly is out! RedNovember (formerly TAG-100, a.k.a. Storm-2077) is a Chinese state-sponsored threat group focused on intelligence collection, especially on flashpoint issues of strategic interest to China. www.recordedfuture.com/research/red...
24.09.2025 18:57 β π 22 π 14 π¬ 2 π 0Couple of openings here in our threat research org!
Staff Security Research Engineer:
proofpoint.wd5.myworkdayjobs.com/en-US/Proofp...
Senior Threat Researcher (ecrime team):
proofpoint.wd5.myworkdayjobs.com/ProofpointCa...
In Swedish, a word for what you eat to bridge the gap between meals (or while waiting for the main course to cook) is stΓΆdmacka. It means "support sandwich."
A similar word in Norwegian is ventepΓΈlse, or "waiting sausage."
#FTSCon Speaker Spotlight: Wesley Shields (@wxs.bsky.social) is presenting βCOLDRIVER: NOROBOT/YESROBOT/MAYBEROBOTβ in the HUNTER track.
See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-gl...
17.09.2025 13:20 β π 85 π 38 π¬ 9 π 5Iβll be giving a talk at FTS this year. Not going to lie, Iβm doing it just so I can heckle Sir Tom of The House of Lancaster (@tlansec.bsky.social) in person.
volatilityfoundation.org/from-the-sou...
ME, IN TEARS: you can't just say every single part of a computer system is a file
UNIX, POINTING AT THE MOUSE: file
The next in-person offering of our Malware and Memory Forensics Training will be held in Arlington, VA from Oct 21st-24th. This course has converted to Volatility 3, and all the material and labs are updated to cover the latest threats & analysis techniques
memoryanalysis.net/courses-malw...
Now up to 22 different Cinnamon Toast Crunch related products. The quest continues.
03.09.2025 16:19 β π 2 π 1 π¬ 0 π 0TL;DR I am launching my #startup and we are going to change how to evaluate,cluster and reason about #malware, delivering accurate,contextual intelligence on samples. Say Hi to RationalEdge
@rationaledge.bsky.social
rationaledge.io
#threatintel #threathunting #cti #reverseengineering #detection 1/9
And thatβs a wrap for our 2025 #summerinternship program! This was a great summer of challenging impactful projects & fun team-building excursions. We wish our students all the best as they settle back into their Dept of Computer Science programs at University of Notre Dame & University of Maryland!
22.08.2025 15:45 β π 2 π 2 π¬ 0 π 0I don't think children should have phones. They should have huge beige desktop computer with "Windows 9x Operating System", "Dedicated 3D accelerator", and "SoundBlaster compatible sound card"
17.08.2025 00:21 β π 1793 π 333 π¬ 75 π 26Coming this October: #FTSCon 2025, hosted by @volatilityfoundation.org! And this year there are TWO in-person training opportunities!π
#dfir #memoryforensics #volatility3 #hardwarehackingbasics #grandideastudio
We are thrilled to announce that @joegrand.bsky.social is this yearβs #FTSCon Keynote speaker! Joe will be sharing stories & technical details about his wallet hacking adventures to kickoff our full-day event on Monday, Oct 20, 2025. You donβt want to miss this!
06.08.2025 20:12 β π 4 π 5 π¬ 1 π 1@volexity.com has released updates to its #opensource GoResolver project and more! This work was part of a project for one of our #summerinternship students. Read more details about Volexityβs updated GoResolver projects + other #golang tools in our special blog post!
11.08.2025 19:05 β π 10 π 10 π¬ 1 π 0#ESETresearch has discovered a zero-day vulnerability in WinRAR, exploited in the wild by Russia-aligned #RomCom @dmnsch @cherepanov74 www.welivesecurity.com/en/eset-rese...
1/7
YARA-X 1.5.0 is out. Nice new features (including a crx module) and bug fixes. Congratulations to Victor and all the contributors!
github.com/VirusTotal/y...
Incredible writeup from Eye Security on their adventures logging into internal-only MS services: research.eye.security/consent-and-...
08.08.2025 08:40 β π 0 π 0 π¬ 0 π 0A radiologist called me yesterday. It sounded serious. They said they spotted an anomaly on my x-rays. I was prepared for the worst. They found a strange shape and the word "Quantamonster." That's the company logo of my new startup. Years ago I asked a surgeon to engrave it onto my patella. Now, every time I go for an X-ray, the radiologist sees it, gets intrigued. If they search it, they'll find that we've just opened a new seed round. They sign up. Some say to raise investor money you have to think outside the box. I say you need to think inside the body. Venture capitalism is in my bones.
A radiologist called me yesterday. I was prepared for the worst
06.08.2025 09:29 β π 146 π 18 π¬ 2 π 3I think about this quote alot:
youtu.be/8J8A9ZiIeUQ?...
QUIZ: Are You Even Good Enough to Have Imposter Syndrome?
05.08.2025 09:49 β π 503 π 93 π¬ 15 π 13Jen Easterly was a supremely effective leader of CISA and you would be very hard pressed to find anyone who's a more qualified and quietly competent professional than her. This administration and its gormless hacks continue to cut off our collective noses to spite our face.
31.07.2025 18:26 β π 93 π 35 π¬ 1 π 1Microsoft found Turla, Russia's elite FSB cyberespionage group, hacking foreign embassies' staff in Moscow by directly meddling with ISP traffic to infect targets with spyware that silently stripped away encryption on their communications and credentials. www.wired.com/story/russia...
31.07.2025 16:01 β π 121 π 71 π¬ 1 π 3First cell-phone network cyberattack on Tibetan leader detected @tibcert.bsky.social
www.phayul.com/2025/07/29/5...
~Paloalto~
Nation-state actor Liminal Panda uses custom malware like GTPDoor to infiltrate telecom networks for persistent access and potential location tracking.
-
IOCs: GTPDoor, ChronosRAT, NoDepDNS
-
#GTPDoor #LiminalPanda #ThreatIntel
When your CTI blog uses AI art, it immediately loses 10 respect points. Discuss.
28.07.2025 12:17 β π 1 π 0 π¬ 0 π 0