Dangerous Invitations: Russian Threat Actor Spoofs European Security Events in Targeted Phishing Attacks
In early 2025, Volexity published two blog posts detailing a new trend among Russian threat actors targeting organizations through the abuse of Microsoft 365 OAuth and Device Code authentication workf...
@volexity.com tracks a variety of threat actors abusing Device Code & OAuth authentication workflows to phish credentials, which continue to see success due to creative social engineering. Our latest blog post details Russian threat actor UTA0355βs campaigns impersonating European security events.
04.12.2025 18:36 β π 6 π 7 π¬ 0 π 0
@stevenadair.bsky.social is back again!
Founder + President of Volexity leading a team of experts that deal w/ complex cyber intrusions from nation-state level intruders. His talk will cover a Chinese APT actor that Volexity tracks as UTA0388.
Check out the official agenda:
cyberwarcon.com
15.10.2025 15:11 β π 2 π 5 π¬ 0 π 1
APT Meets GPT: Targeted Operations with Untamed LLMs
Starting in June 2025, Volexity detected a series of spear phishing campaigns targeting several customers and their users in North America, Asia, and Europe. The initial observed campaigns were tailor...
APT meets GPT: @volexity.com #threatintel is tracking #threatactor UTA0388's spear phishing campaigns against targets in North America, Europe & Asia, appearing to use LLMs to assist their ops. Letting #AI run your espionage operations? What could go wrong?
08.10.2025 12:35 β π 3 π 3 π¬ 0 π 0
#FTSCon Speaker Spotlight: Juan AndrΓ©s Guerrero-Saade is presenting βFrom Threat Hunting to Threat Gatheringβ in the HUNTER track.
See the full list of speakers + event info, including how to register, here: volatilityfoundation.org/from-the-sou...
18.09.2025 13:15 β π 1 π 4 π¬ 0 π 0
Joe Grand's Hardware Hacking Basics [FTSCon 2025]
This two-day comprehensive course teaches fundamental hardware hacking concepts and techniques used to explore, manipulate, and exploit electronic devices.
We are excited to announce that we are hosting a second training course for #FTSCon week! Join @joegrand.bsky.social as he leads his popular 2-day Hardware Hacking Basics course on Oct. 21-22 in Arlington VA! Registration is now OPEN!
01.08.2025 15:09 β π 4 π 5 π¬ 1 π 0
The Call For Speakers for #FTSCon closes tomorrow! Make sure to submit your talks before the deadline! This is a great opportunity to share your DFIR open source tools and investigation tales with leading experts in the field.
22.07.2025 14:58 β π 2 π 3 π¬ 0 π 0
The stylized blue, orange and black Volexity Volcano logo is centered, with the Volcano wordmark below it. The words βby Volexityβ appear below the Volcano logo. There is a dark blue banner in the upper left with white letters that read βNew Releaseβ. The background is a faded gray abstract illustration evoking smoke.
@Volexity.com Volcano Server & Volcano One v25.06.12 adds ~600 new YARA rules, new IOCs for fake registered antivirus & hooked Linux kernel functions, as well as support for custom post-processing bash scripts, segmented directory watching & database optimization. [1/2]
18.06.2025 16:42 β π 3 π 3 π¬ 1 π 1
The Call for Presentations for From the Source 2025 is open! Our Makers Track is aimed at developers of open source DFIR tools and the Hunters track covers the best Threat Intel research of the past year. β¨β¨
See the full details in our blog post: volatilityfoundation.org/announcing-f...
05.06.2025 16:03 β π 4 π 6 π¬ 0 π 1
Announcing FTSCon 2025 & In-person Malware and Memory Forensics Training!
Mark your calendars for Monday, October 20, 2025! We will again be hosting FTSCon in Arlington, Virginia.You can read more event details here. Registration is now open!
We are excited to announce FTSCon 2025 on October 20, 2025, in Arlington VA! Registration is now OPEN + we have a Call for Speakers.
Following FTSCon will be a 4-day Malware & Memory Forensics Training course with Volatility 3.
See the full details here: volatilityfoundation.org/announcing-f...
23.05.2025 18:00 β π 7 π 9 π¬ 0 π 2
New research from the team: Involves clever m365 OAuth tricks + phishing via Signal and WhatsApp to compromise accounts. #dfir #threatintel
22.04.2025 16:52 β π 2 π 1 π¬ 0 π 0
I will be speaking at @kernelcon.bsky.social on Fri, Apr 3rd. The talk will cover previously-unreported features of the sedexp Linux malware found in the wild - including loading of a memory-only rootkit! Talk will cover how the rootkit was discovered & how to analyze with @volatilityfoundation.org
07.03.2025 18:47 β π 12 π 9 π¬ 0 π 0
An image of the blue and orange Volexity Volcano logo with a New Release banner to announce the release of Volcano Server & Volcano One v25.02.21
@volexity.com Volcano Server & Volcano One v25.02.21 adds 300 new YARA rules; consistent Bash/ZSH history & sessions from Linux/macOS memory and files; and parses Linux systemd journals, macOS unified logs, and Windows USNs (search + timeline for all).
[1/2]
#dfir #memoryforensics #memoryanalysis
26.02.2025 15:00 β π 6 π 5 π¬ 1 π 1
One of the main takeaways -- block device code authentication flow via conditional access 2/2
#Microsoft365 #DFIR #ThreatIntel
14.02.2025 14:50 β π 4 π 2 π¬ 0 π 0
Check out the new blog: Russian APT adopts a well-known technique of m365 device code phishing. When combined with clever lures this technique proved to be extremely successful. 1/2
14.02.2025 14:50 β π 5 π 3 π¬ 1 π 0
As seen in this guidance from NCSC published today, memory forensics continues to play a critical role in modern digital investigations! After almost 20 years, it's encouraging to still see the need for the amazing work by the #Volatility contributors!
04.02.2025 16:36 β π 6 π 5 π¬ 0 π 0
Cyber agencies unveil new guidelines to secure edge devices from increasing threat
New guidelines encourage device manufacturers to include and enable standard logging and forensic features that are robust and secure by default.
Itβs great to see NCSC drawing attention to the ongoing issues with network devices & appliances. Hopefully vendors heed the volatile data collection guidance βVolatile data logging should support collection ofβ¦ memory both at a kernel and individual process level.β
www.ncsc.gov.uk/news/cyber-a...
04.02.2025 15:57 β π 7 π 7 π¬ 1 π 1
If you will be at @wildwesthackinfest.bsky.social next week then be sure to attend my talk!
01.02.2025 15:44 β π 6 π 4 π¬ 0 π 0
We presented on this last month at #FTSCon (IYKYK). Steven is also presenting today @CYBERWARCON. Really excited to finally share this research publicly! It's probably one of the more crazy/interesting IR engagements we've ever worked π€― #DFIR #ThreatIntel
22.11.2024 17:27 β π 12 π 4 π¬ 2 π 1
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack
In a first, Russia's APT28 hacking group appears to have remotely breached the Wi-Fi of an espionage target by hijacking a laptop in another building across the street.
Russian spiesβlikely Russia's GRU intelligence agencyβused a new trick to hack a victim in Washington, DC: They remotely infected another network in a building across the street, hijacked a laptop there, then breached the target organization via its Wifi. www.wired.com/story/russia...
22.11.2024 12:06 β π 580 π 329 π¬ 12 π 46
We are Microsoft's global network of security experts. Follow for security research and threat intelligence. https://aka.ms/threatintelblog
Journalist at Bloomberg News in DC. Signal: @howelloneill.01, email: patoneill1@bloomberg.net https://www.bloomberg.com/authors/AXb8dLPHBFc/patrick-howell-oneill
CEO/Founder @ volexity.com
Core Dev/Founder @ volatilityfoundation.org
Thought Trailer, Cyber Threat Intel, DFIR. He/Him. Bucketing, sharing, and bacon-saving as a service. https://validhorizon.medium.com/
oh great, now Iβm on bluesky
Working at Google TAG. Retired FreeBSD committer. May or may not be a robot.
Cybersecurity reporter, CNN. Signal +1-202-355-8471 or SNLyng.11. sean[dot]lyngaas@cnn[dot]com|slyngaas@proton[dot]me
Writer. Contact me here: https://raphae.li
#threatintel Americas Lead @pwc. Hype woman. Beach Rat. Former Adjunct @Columbia. Lover of all the APTs. | All views are my own. @SaltyWikoff@infosec.exchange (not really though)
@SaltyWikoff at the other place
Creative. Mom. Loves the outdoors. Plymouth State alum. Marketing @volexity.com
Started in infosec, co-authored the kill chain paper, dabbled in countering influence operations at Meta, and now back to infosec. Lover of command line, python, and rust.
Romanian antihacker from another planet. #threatintel #yara #chess #taekwondo black belt
Motto: "One reboot a day keeps the implant away"
Infosec / GRC nerd and Halloween enthusiast. He/Him. Be kind.
Cybersecurity tinkerer by day, wine and cheese tinkerer by night. Security @ Datadog | ex-Coinbase Security, Tines
I drink amari and I know things. $ddz
LMDDGTFY: https://duckduckgo.com/?q=dino+dai+zovi
NYC/BK
Security Researcher at Google Project Zero. 0-days all day. Love all things reverse engineering. she/her
Executive Director for Intelligence and Security Research @ SentinelOne.
Distinguished Fellow and Adj Professor @ Hopkins SAIS Alperovitch Institute. Three Buddy Problem Co-Host. LABScon Founder, Cyber Paleontologist, Fourth-Party Collector.