Bart (@bartblaze) 's Twitter Profile
Bart

@bartblaze

Threat Intel and more. Opinions are my own, unless retweeted. Open DMs.

ID: 97689916

linkhttps://bartblaze.blogspot.com calendar_today18-12-2009 15:31:59

17,17K Tweet

13,13K Takipçi

643 Takip Edilen

Andreas Klopsch (@hackingump1) 's Twitter Profile Photo

🚨 RIFT Update: We’ve boosted our compiler detection! 🛠️ Now with sharper insights into binaries built using GNU, MinGW, and MSVC toolchains. More enhancements are on the way—stay tuned! 🔍✨ #ReverseEngineering #MalwareAnalysis #RIFT #malware #msft github.com/microsoft/RIFT

NVISO Labs (@nviso_labs) 's Twitter Profile Photo

Looking to elevate your #ThreatDetection strategy? 👀 Learn how to design repositories for detection-as-code with tips on branch strategy, repo organization & more. Part 2 of St0pp3r‘s blog post series on #DetectionEngineering is live! 👇 blog.nviso.eu/2025/07/17/det…

Looking to elevate your #ThreatDetection strategy? 👀 Learn how to design repositories for detection-as-code with tips on branch strategy, repo organization &amp; more. Part 2 of <a href="/_st0pp3r_/">St0pp3r</a>‘s blog post series on #DetectionEngineering is live! 👇
blog.nviso.eu/2025/07/17/det…
NVISO Labs (@nviso_labs) 's Twitter Profile Photo

The #DetectionEngineering follow-up YOU've been waiting for is here! Boost your #DetectionRepository with insights from St0pp3r latest blog post. Focus: Implementing validation checks to boost consistency & ensure top-notch quality. 👉blog.nviso.eu/2025/08/05/det…

The #DetectionEngineering follow-up YOU've been waiting for is here! Boost your #DetectionRepository with insights from <a href="/_st0pp3r_/">St0pp3r</a> latest blog post.

Focus: Implementing validation checks to boost consistency &amp; ensure top-notch quality. 👉blog.nviso.eu/2025/08/05/det…
Wil (@wil_fri3d) 's Twitter Profile Photo

gpoParser, which I presented at #leHACK2025 and #DEFCON, is available here: github.com/synacktiv/gpoP… It is a specialized utility designed to enumerate Group Policy Objects (GPOs) and identify potential security misconfigurations.

YungBinary (@yungbinary) 's Twitter Profile Photo

Dropping a new malware config parser for #Amadey! Update your CAPEv2 parsers: > sudo -u cape bash -c 'cd /opt/CAPEv2 && poetry add CAPE-parsers@latest && systemctl restart cape cape-web cape-processor' Check it out here: github.com/CAPESandbox/CA…

Dropping a new malware config parser for #Amadey!

Update your CAPEv2 parsers:
    &gt; sudo -u cape bash -c 'cd /opt/CAPEv2 &amp;&amp; poetry add CAPE-parsers@latest &amp;&amp; systemctl restart cape cape-web cape-processor'

Check it out here:

github.com/CAPESandbox/CA…
Mari0n (@pinkflawd) 's Twitter Profile Photo

I reverse engineered Lockbit's Linux ESXi variant, also explaining how I did some of the steps! For the fun of it, cause reverse engineering is lots of fun. Enjoy! hackandcheese.com/posts/blog1_lo…

I reverse engineered Lockbit's Linux ESXi variant, also explaining how I did some of the steps! For the fun of it, cause reverse engineering is lots of fun. Enjoy! hackandcheese.com/posts/blog1_lo…
hasherezade (@hasherezade) 's Twitter Profile Photo

Updated #PEsieve / #HollowsHunter / #MalUnpack: github.com/hasherezade/pe… / github.com/hasherezade/ho… / github.com/hasherezade/ma… - check them out 💙

Updated #PEsieve / #HollowsHunter / #MalUnpack: github.com/hasherezade/pe… / github.com/hasherezade/ho… / github.com/hasherezade/ma… - check them out 💙
John Hultquist (@johnhultquist) 's Twitter Profile Photo

We are releasing details on BRICKSTORM malware activity, a China-based threat hitting US tech to potentially target downstream customers and hunt for data on vulnerabilities in products. This actor is stealthy, and we've provided a tool to hunt for them. cloud.google.com/blog/topics/th…

ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETresearch has uncovered the North Korea-aligned threat actor, DeceptiveDevelopment, targeting freelance developers with trojanized coding challenges and fake job interviews.  welivesecurity.com/en/eset-resear… 1/6

Trend Micro Research (@trendmicrorsrch) 's Twitter Profile Photo

LockBit 5.0 uses advanced obfuscation and anti-analysis techniques to evade detection, now targeting Windows, Linux, and ESXi virtualization infrastructure for cross-platform enterprise compromise. Our latest research details technical upgrades and provides guidance for

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Cisco just confirmed that multiple zero-days against ASA/FTD VPN web services were exploited in the wild. CISA followed up with an Emergency Directive ordering federal agencies to inventory, patch, or disconnect affected devices. The last 3 Cisco advisories are directly tied to

Cisco just confirmed that multiple zero-days against ASA/FTD VPN web services were exploited in the wild. CISA followed up with an Emergency Directive ordering federal agencies to inventory, patch, or disconnect affected devices.

The last 3 Cisco advisories are directly tied to
nickharbour (@nickharbour) 's Twitter Profile Photo

Unfortunately, the #flareon12 unlocked early yesterday and some players got a head start. This will not effect the final standings as deltas will be applied to the player's final solve times (if they finish) to reflect the early access they received.

Matt Johansen (@mattjay) 's Twitter Profile Photo

This BBC reporter was offered 25% of a ransom payout if he gave hackers access to the corporate network. He played along, so we got a look inside their tactics here:

This BBC reporter was offered 25% of a ransom payout if he gave hackers access to the corporate network.

He played along, so we got a look inside their tactics here:
NVISO Labs (@nviso_labs) 's Twitter Profile Photo

On September 29th, 2025, Broadcom disclosed a local privilege escalation vulnerability, CVE-2025-41244, impacting VMware’s guest service discovery features. NVISO has identified zero-day exploitation in the wild beginning mid-October 2024. All details - blog.nviso.eu/2025/09/29/you…

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

"On September 29th, 2025, Broadcom disclosed a local privilege escalation vulnerability, CVE-2025-41244, impacting VMware’s guest service discovery features. NVISO Labs has identified zero-day exploitation in the wild beginning mid-October 2024. The vulnerability impacts both

Check Point Research (@_cpresearch_) 's Twitter Profile Photo

🚨 Rhadamanthys v0.9.2 is here! What’s new in this multi-layered stealer’s latest evolution? We break down the updates, tactics, and what defenders need to know. Dive into our blog for the full analysis. research.checkpoint.com/2025/rhadamant…

hasherezade (@hasherezade) 's Twitter Profile Photo

My recent writeup on updates in #Rhadamanthys stealer, along with some scripts that may be helpful in analysis. Check it out!

PagedOut (@pagedout_zine) 's Twitter Profile Photo

pagedout.institute ← we've just released Paged Out! zine Issue #7 pagedout.institute/download/Paged… ← direct link lulu.com/search?page=1&… ← prints for zine collectors pagedout.institute/download/Paged… ← issue wallpaper Enjoy! Please please please RT to spread the news - thank you!