#BREAKING #ESETresearch identified the wiper #DynoWiper used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malware’s design clearly indicates destructive intent. 1/5
23.01.2026 16:30 — 👍 35 🔁 30 💬 1 📌 5
You fear innovation
22.01.2026 13:54 — 👍 22 🔁 4 💬 0 📌 1
We Are Witnessing the Self-Immolation of a Superpower
With Donald Trump’s actions in Greenland, Minneapolis, and Venezuela, a foreign enemy could not invent a better chain of events to wreck the standing of the United States.
"A superpower is choosing to self-immolate and torch its remaining global trust and friendships, including and especially NATO...at the precise moment when it had been reinvigorated and renewed...in the wake of Russia’s large-scale invasion of Ukraine in 2022" - by @vermontgmg.bsky.social
22.01.2026 13:55 — 👍 48 🔁 18 💬 0 📌 1
Appreciate the tip! Will see if it takes down the champ!
16.01.2026 00:15 — 👍 0 🔁 0 💬 0 📌 0
We have not! Worth giving a go?
16.01.2026 00:10 — 👍 0 🔁 0 💬 1 📌 0
I don’t think we’ve collectively paid enough attention to the fact that Annie’s is now the regent of boxed Mac and cheese
Kraft got their chain snatched and now it just tastes like dog water compared to Annie’s
16.01.2026 00:00 — 👍 4 🔁 0 💬 3 📌 0
I for one am excited for the Hoth Takes episode on this one to help me digest this news
15.01.2026 23:51 — 👍 1 🔁 0 💬 0 📌 0
#100daysofYARA - day 12
VirusTotal uses CAPE sandbox to identify many malware families and determine if they can extract the malware's configuration. Since they use CAPE, we can often see their logic. Today, we'll suggest edits to a rule for AgentTesla.
Rule at end.
1/10
14.01.2026 12:38 — 👍 7 🔁 6 💬 1 📌 0
words don't mean anything anymore
13.01.2026 14:30 — 👍 3 🔁 0 💬 0 📌 0
Imagine publishing a blog on "Lazarus" in the year of our lord 2026
13.01.2026 14:27 — 👍 6 🔁 2 💬 4 📌 0
#100DaysofYARA - Day 11
In looking at automatic YARA generation, yarGen-Go is a must. Just released by @cyb3rops, it is a rewrite and advancement from the original yarGen.
We'll look at the same malware from day 10; a targeted HavocC2 loader with decoy.
rule at bottom
1/5
12.01.2026 14:27 — 👍 5 🔁 2 💬 1 📌 0
100DaysofYARA/Squiblydoo/Day9.yara at main · Squiblydoo/100DaysofYARA
Rules shared by the community from 100 Days of YARA 2026 - Squiblydoo/100DaysofYARA
This scripts are deceptive as they contain 10,000 empty lines. BTW #malcat loads scripts like these better than most text editors.
If I get the chance, I may revise it to see how to find ones without the matching text or if you have ideas, hmu.
github.com/Squiblydo...
3/3
10.01.2026 19:17 — 👍 4 🔁 1 💬 0 📌 0
Inside the BlueNoroff Web3 macOS Intrusion Analysis | Huntress
Learn how DPRK's BlueNoroff group executed a Web3 macOS intrusion. Explore the attack chain, malware, and techniques in our detailed technical report.
The rule is fairly simple but it seems that at least one DPRK team is using the same consistent message in the header. I validated this using ReversingLab's YARA scanning.
A slightly different header is seen in Huntress' analysis: www.huntress.com/blo...
2/3
10.01.2026 19:17 — 👍 1 🔁 1 💬 1 📌 0
#100DaysofYARA - Day 9
YARA looks for the header used in a .SCPT file used by BlueNoroff (DPRK) to target MacOS systems.
Script is delivered to victims disguised as a Zoom meeting launcher.
e.g. a7c7d75c33aa809c231f1b22521ae680248986c980b45aa0881e19c19b7b1892
Rule at end
1/3
10.01.2026 19:17 — 👍 3 🔁 2 💬 1 📌 0
#100DaysofYARA - Day 8
For many years, many attackers tried to keep their binaries small. However, the others found the opposite works too: extremely large binaries can cause problems with analysis.
What can be done about these large executables?
Rule at end
1/6
08.01.2026 17:48 — 👍 1 🔁 2 💬 1 📌 0
The same people spent the last decade justifying Black folks being choked to death on camera… they’ve been practicing
08.01.2026 13:23 — 👍 742 🔁 194 💬 7 📌 1
congress should behave like a co equal branch
impeachment
defunding
filing suits
subpoenas
writing laws
hearings, hearings, hearings
what else?
07.01.2026 20:53 — 👍 14 🔁 4 💬 1 📌 3
GRU-Linked BlueDelta Evolves Credential Harvesting
Insikt Group reveals how GRU-linked BlueDelta evolved credential-harvesting campaigns targeting government, energy, and research organizations across Europe and Eurasia.
Today, we released new @RecordedFuture research detailing BlueDelta’s expanded credential-harvesting activity observed between February and September 2025. #BlueDelta #APT28 #FANCYBEAR #ForestBlizzard #FROZENLAKE #ITG05 #PawnStorm #Sednit #Sofacy #TA422 (1/5) www.recordedfuture.com/research/gru...
07.01.2026 15:39 — 👍 7 🔁 5 💬 1 📌 0
#100DaysofYARA - Day 7
@malwrhunterteam identified a suspicious file signed by "Xiamen Jialan Guang Information Technology Service Co., Ltd."
While we have a pretty good idea it'll be abused, it hasn't been yet.
So, lets watch for it to be abused.
Rule at end
1/5
07.01.2026 14:32 — 👍 2 🔁 1 💬 1 📌 1
#100DaysofYARA - Day 6
In December and again in January, an unknown actor replaced the download on EmEditor's website with a malicious installer. Each time, the download was a trojan installer with a valid code-signing signature.
How can we detect this?
Rule at end
1/6
06.01.2026 13:03 — 👍 6 🔁 2 💬 1 📌 0
YARA-X can dump the certificate details of a MACHO binary.
"yr dump [file]" shows the data produced by the modules
We can output it to JSON and pass it to jq as like this:
yr dump -o=json [file] | jq '.macho.certificates'
3/7
05.01.2026 13:10 — 👍 3 🔁 1 💬 2 📌 0
#100DaysofYARA - Day 4
One heavy user of code-signing certificates is Rhysida Ransomware.
In June, I created a YARA rule focusing on their malware to help me find and report their certificates. To do so, I had to create a YARA rule on the Rich PE Header.
Rule at end
1/7
04.01.2026 14:40 — 👍 4 🔁 2 💬 1 📌 0
#100DaysofYARA - day 5
The Cert Graveyard project reports and documents abuse code-signing including Apple issued certificates.
When reporting a certificate, we want to ensure Apple has all the identifiers they need to investigate and act.
Rule at end
1/7
05.01.2026 13:10 — 👍 7 🔁 3 💬 1 📌 0
Cohesive is a great word for it
04.01.2026 22:14 — 👍 0 🔁 0 💬 0 📌 0
Before I get asked
would cut these songs:
HT - Pushing Me Away
R - By_myslf
M - easier to run + from the inside
MTM - what I’ve done - V-Day
ATS - none
No skips on from Xero rn either. Haven’t listened to rest of discography recently enough to comment
04.01.2026 22:11 — 👍 1 🔁 0 💬 0 📌 0
Now that I think about it, it’s their only album (that I listen to regularly anyway) with no songs I skip
04.01.2026 22:05 — 👍 0 🔁 0 💬 2 📌 0
That’s quite the take!!
What’s your favorite song not on A Thousand Suns?
04.01.2026 21:41 — 👍 0 🔁 0 💬 1 📌 0
Listening to a lot of A Thousand Suns recently
Not sure why, surely not some subliminal or subconscious reason
04.01.2026 17:53 — 👍 1 🔁 0 💬 1 📌 0
CSO @ Proofpoint. Infosec lifer. Charter member of nerd nation. MacKenzie appreciator. Forza Inter.
TV/VCR Repair, Bad Guys & Breaches, big Jim Harrison poetry fan
Hub for Star Wars news, reviews, trivia, & more!
Check out our website: TheHoloFiles.com
Official account of the State of Statecraft conference.
Coming October 28, 2025 - Brussels, Belgium
http://stateofstatecraft.com
THE AGENDA IS LIVE: https://stateofstatecraft.com/agenda
#what_is_sos
501(c)(3) Nonprofit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021!
Too much technology, in too little time.
Professor at the Middlebury Institute, member of the National Academies Committee on International Security and Arms Control, and former member of the State Department's International Security Advisory Board.
Sr. Director of SOC at Huntress. Ex-Mandiant/FireEye. Bringing security to the Fortune 5,000,000.
Principal Intelligence Analyst @ Symantec. Views are my own etc. https://keybase.io/abnev
professional strings(1) operator
rust reverse engineering training -> @decoderloop.com
she/her or they/them
🏳️🌈😎
personal account! views are mine.
en_CA/zh_CN/fr_CA
https://cxiao.net
https://infosec.exchange/@cxiao
Threat Research at SnapAttack now part of Splunk now part of Cisco / Detection Engineering / Dad | #DetectionEngineering #ThreatHunting #PurpleTeam | Header art from http://art.vx-underground.org.
Senior Malware Researcher @VMRay
#Security #Azure #EntraID #XDR #MDE #Identity #M365 #AD #PKI #KQL
Microsoft MVP
Tweets and opinions are my own
Cyber Threat Intelligence Analyst
@EclecticIQ | Threat Hunter | Malware Analyst |. (All opinions expressed here are mine only). 🇹🇷🇳🇱
#cybersecurity
Know First. Preemptive Cyber Intelligence with Indicators of Future Attack™.
Join the Community today: explore.silentpush.com/register
Cyber Threat Investigator, retired USAF Intel Analyst / Manager. Play nice and enjoy the great outdoors!
Threat Intel | C2 Tracking | Fly Fishing