Tomislav Pericin(@ap0x) 's Twitter Profileg
Tomislav Pericin

@ap0x

CSA at ReversingLabs LLC. Designs file analysis platforms, engines and reverse engineering tools for fun. Something about unpacking and PE file format.

ID:17285652

linkhttp://www.reversinglabs.com calendar_today10-11-2008 12:30:03

1,4K تغريدات

1,7K متابعون

480 التالية

Follow People
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

⏰ Tomorrow: We are hosting a live demo of RL Spectra Assure! Join RL’s Co-Founder Tomislav Peričin (Tomislav Pericin) as he demonstrates the capabilities of our solution, powered with -driven complex binary analysis. RSVP now ⬇️ bit.ly/3VsmBbU

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

A malicious campaign targeting results in the temporary suspension of new user registration and new project creation: bit.ly/3PELehQ

RL has now observed more than 500 PyPI packages published through an automated system in 2 days as part of this campaign. 🧵 ⬇️

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

🚨 New : ReversingLabs has discovered a campaign using packages posing as open-source libraries to steal BIP39 mnemonic phrases, which are used to recover lost or destroyed wallets ⬇️ bit.ly/3wOl5Xk

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

This week, RL released its annual report: The State of 2024. In it, we identify 2023’s biggest attacks and how threat actors are improving. Get the report’s key takeaways here: hubs.ly/Q02gQtzY0

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

🚨 New 🚨 RL Researchers have found that malicious actors are becoming more innovative: They've moved from simple downloaders executing inside install scripts to a more refined approach that exploits ’s integrations feature. hubs.ly/Q027crBQ0

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

ReversingLabs researchers discovered a new malicious campaign on in which the letter 's' was all that separated a legit package from its malicious twin. The typosquatted package delivering the rootkit was downloaded more than 700 times. hubs.ly/Q024jJXm0

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

🚨 Update 🚨 ReversingLabs researchers discovered more packages that are part of the previously identified campaign, as well as evidence linking the campaign to North Korea's Group. hubs.ly/Q020Q09j0

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

🚨 Breaking 🚨 ReversingLabs researchers have identified more than a dozen malicious packages targeting API users on the repository, which recalls a 2021 attack. RL er Lucija Valentić has the story ➡️ hubs.ly/Q01_YZ8s0

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

In this CybersecInsider blog post, Tomislav Peričin (@ap0x), Chief Software Architect at ReversingLabs shares the key takeaways from the recent on , as well as what it means for & . hubs.ly/Q01ZCt9V0

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

ReversingLabs is on a rocket ship 🚀 we're pleased to share that our is growing! Please join us in welcoming:
📈 Michael Parker, Chief Marketing Officer
🏁 Ron Kormenek, SVP of Worldwide Sales
💯 Saša Zdjelar, Chief Trust Officer
hubs.ly/Q01Y2mYg0

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

⚠️ ReversingLabs researchers have discovered a new 'dual use’ campaign that uses malicious packages to power kits and attacks. Get the latest below ⬇️ hubs.ly/Q01WQn5W0

account_circle
RSA Conference(@RSAConference) 's Twitter Profile Photo

Experts believe that sophisticated cyber campaigns targeting software supply chains will become even more prominent in the months and years ahead — and there’s a good reason why. More on the blog from author Tomislav Pericin. spr.ly/6013OLkL3

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

ICYMI: ReversingLabs co-founder & chief software architect Tomislav Peričin wrote for RSA Conference's blog on why sophisticated campaigns that target will become even more prominent in the future. Read the full article now: hubs.ly/Q01S5g6l0

account_circle
CVE(@CVEnew) 's Twitter Profile Photo

CVE-2023-0041 [PROBLEMTYPE] in [COMPONENT] in [VENDOR] [PRODUCT] [VERSION] on [PLATFORMS] allows [ATTACKER] to [IMPACT] via [VECTOR] cve.mitre.org/cgi-bin/cvenam…

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

The ReversingLabs team has identified a novel attack on using compiled Python to evade detection — possibly the first attack to take advantage of PYC file direct execution. hubs.ly/Q01R-7nt0

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

ReversingLabs researchers discovered two malicious packages that contained , an open source that lurked on for two months before being detected. Get the full story here ➡️ hubs.ly/Q01QpdRf0

account_circle
ReversingLabs(@ReversingLabs) 's Twitter Profile Photo

Here's how bad actors are pushing on under the guise of legitimate yet abandoned open source modules, written by ReversingLabs Lucija Valentić. hubs.ly/Q01MzmB20

account_circle