#ESETresearch uncovers GhostRedirector, a threat actor compromising Windows servers with a C++ Backdoor named Rungan and Gamshen, a native IIS malware welivesecurity.com/en/eset-resear… 1/6
The embargo (12:00 UTC 2025-06-10) is over, let's start a thread on Hydroph0bia (CVE-2025-4275), a trivial SecureBoot and FW updater signature bypass in almost any Insyde H2O-based UEFI firmware used since 2012 and still in use today.
English writeup: coderush.me/hydroph0bia-pa…
#ESETresearch analyzed a campaign deployed by BladedFeline, an 🇮🇷-aligned threat actor with likely ties to #OilRig. We discovered the campaign, which targeted Kurdish and 🇮🇶 government officials, in 2024. welivesecurity.com/en/eset-resear… 1/6
Another pointless weekend project - a playable version of the old 3DMaze screensaver from Windows 9x.
I reverse-engineered the original screensaver binary and added user-input functionality for the controls (and fixed some other minor issues!)
github.com/x86matthew/Pla…
🚨NEW from Binarly: "LogoFAIL Exploited to Deploy Bootkitty, the first UEFI bootkit for Linux".
We found a direct connection between the newly discovered #Bootkitty Linux bootkit and in-the-wild weaponized exploitation of the #LogoFAIL vulnerability.
binarly.io/blog/logofail-…
#ESETresearch reveals the first Linux UEFI bootkit, Bootkitty. It disables kernel signature verification and preloads two ELFs unknown during our analysis. Also discovered, a possibly related unsigned LKM – both were uploaded to VT early this month. welivesecurity.com/en/eset-resear… 1/5
#ESETresearch discovered an #exploit targeting Firefox and Windows zero days, used in the wild by Russia-aligned #RomCom. Browsing a specially crafted web page runs arbitrary code with the privileges of the user, compromising the PC. @dmnsch & R.Dumont welivesecurity.com/en/eset-resear… 1/7
#ESET research has identified #Linux malware samples, one of which we named #WolfsBane and attribute with high confidence to #Gelsemium. This 🇨🇳 China-aligned APT group , active since 2014, has not previously been publicly reported to use Linux malware. welivesecurity.com/en/eset-resear……
The award-winning Qualys Threat Research Unit (TRU) has discovered a critical vulnerability in OpenSSH, designated CVE-2024-6387 and aptly named "regreSSHion." This Remote Code Execution bug grants full root access, posing a significant exploitation risk. blog.qualys.com/vulnerabilitie…
343 Followers 4K FollowingCTI and former SCE at @IBMSecurity | Former IR at @Citi | Cybersecurity | Business Admin | Finance | OSINT | Dogs, Grilling and Motorcycles
177 Followers 180 FollowingCyber Threat Hunter at Broadcom Inc. (Symantec Enterprise Division)
Formerly ESET Research.
also me: https://t.co/u4EOrwZNXa
10K Followers 462 FollowingThreat Researcher at Check Point @_CPResearch_ #DFIR #Reversing - All opinions expressed here are mine only.
https://t.co/iWvwWF1AnN
144 Followers 3K FollowingProgramming for fun.
Learning everything that interests me :)
Overwhelmed by my wide area of interests ;)
Wannabe the best hacker and programmer🤞🤞
25K Followers 26K FollowingA Hacker who is A Lover of People, and Life @RetroTwinz @Secbsd, @GrumpyHackers, @NovaHackers, @deadpixelsec @hacknotcrime Advocate @PositivelyBlue_ OSCP, OSWP
1K Followers 255 Followingcurrently based in BsAs • born and raised in Medellín • travelholic, scubaholic and security researcher • learning and sharing #DataScience #MalwareAnalysis
3K Followers 138 FollowingOfficial Twitter page for Middle-earth Enterprises, licensing film, stage, and merchandising rights associated with #TheLordoftheRings and #TheHobbit.
3K Followers 1K FollowingBSides Security Conference Chile, espacio relacionado con la Seguridad de la Información con expositores nacionales e internacionales.
9K Followers 11 FollowingProactive Defense Against Future Threats | Pioneering #CyberSec and #ThreatIntelligence in Europe & MENA since ’12.
CTI Platform: #USTA Risk Intel: #BLINDSPOT
242K Followers 869 FollowingThe only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.
9K Followers 647 FollowingA leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime. Combating cybercrime since 2003
9K Followers 332 FollowingReverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
4K Followers 287 FollowingExpert on cyber threats detection and response. Fast detect and respond to threats with high-fidelity, efficient, actionable security intelligence.
13K Followers 310 FollowingThreat Researcher, Blue Team, DFIR, Malware Analysis, and Reverse Engineering.
“⚔️What do we say to God of malware, Not today⚔️”
4K Followers 26 FollowingA global network of #cybersecurity researchers at Gen, protecting nearly 500M people through our Cyber Safety brands - @Norton, @Avast, @LifeLock & more.
4K Followers 147 FollowingA #SOCplatform boosted by #AI and #threatintelligence, combining #SIEM, #SOAR, #Automation in a single solution. Used by End-users, MSSP and APIs
939 Followers 567 FollowingVulnerability Research Lead @binarly_io. Prev: Postdoc @ucsantabarbara. Binary analysis, memory forensics et al. Captures flags with Shellphish and NOPS.
129K Followers 60 FollowingProviding Cyber Threat Intelligence from the Dark Web & Clearnet: Breaches, Ransomware, Darknet Markets, Threat Alerts & more. https://t.co/Fi7VW9lg94