Hax pfp

Hax

@4n

95 Following
9 Followers


Hax pfp
Hax
@4n
#100daysofyara continuing to explore yara-x today I tried to detect a renamed QEMU exe using pe attributes and a dynamic variable. Rule: https://github.com/mgreen27/100daysofyara/blob/main/2025/SUS_Renamed_QEMU_Jan25.yar
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
Years of mediocre gen AI commodities will birth a generation of neo-luddites who refuse to delegate the joys of art, music, writing & human connection to machines. They'll sketch, read human-gen pBooks, buy vinyls at concerts, share hand-written original pre-trend non-memes.
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
"Every security alert I see has to pass a rigorous test to answer one simple question: is it a banger?"
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
Over the past year, we've watched KV Botnet move part of their infrastructure around US hosting providers.
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
🔥Read the technical paper: "UEFI Bootkit Hunting: In-Depth Search for Unique Code Behavior"
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
🔥Read the technical paper: "UEFI Bootkit Hunting: In-Depth Search for Unique Code Behavior"
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
Someone obfuscated NanoDump to evade antivirus detections but failed to evade our dete
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
Someone obfuscated NanoDump to evade antivirus detections but failed to evade our detection rules
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
LockBit ransomware affiliates are known to have used ZSERVERS to attack the UK 🇬🇧
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
The UK 🇬🇧 government has sanctioned the bulletproof hosting provider known as ZSERVERS (aka XHOST Internet Solutions)
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
Our Threat Detection & Research (TDR) team has been analyzing a sophisticated new malware, #I2PRAT, featured in our latest FLINT report- now available in our blog!
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
vvHunt's TLS records have revealed patterns in suspected KEYPLUG infrastructure, linking ongoing activity to GhostWolf and RedGolf/APT41, as reported on January 23, 202
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
In the blog, you’ll
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
I’ve just published a new blog where I explore how PowerShell is used in red team operations, especially by advanced persistent threats (APTs), with a focus on evasion.
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
Apple's USB Restricted Mode bypass (CVE-2025-24200)
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
Ransomware gangs losing their ransomed funds due to the cryptocurrency exchange getting drained by DPRK 🇰🇵 will never not be funny to me 😆 In the realm of cybercrime, the North Koreans are apex predators 👑
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
The Threat Hunting team reports that Earth Preta is using MAVInject and Setup Factory to mix legitimate and malicious components, enabling them to bypass ESET antivirus and maintain control over compromised systems.
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
As a Christmas present, I'm sharing the first notes on a repository of ransomware groups (threat actors, algorithms, extensions, deep analysis...) to track the different rebrands, new variants ...
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
Nouns, few can afford one but anyone with an Ethereum wallet can use it to build a school.
0 reply
0 recast
0 reaction

Hax pfp
Hax
@4n
Memecoins. Anyone can afford one but few can use it to build a school.
0 reply
0 recast
0 reaction