David Koepi (@davidkoepi) 's Twitter Profile
David Koepi

@davidkoepi

ID: 249862861

calendar_today09-02-2011 23:06:34

13,13K Tweet

328 Followers

699 Following

DFIR Radar (@dfir_radar) 's Twitter Profile Photo

North Korea's 🇰🇵 Kimsuky APT weaponizes GitHub as C2 infrastructure in multi-stage campaign targeting South Korean 🇰🇷 organizations. Attack chain uses obfuscated LNK files, PowerShell LOLBins, and legitimate cloud platforms to evade detection while maintaining persistent access.

North Korea's 🇰🇵 Kimsuky APT weaponizes GitHub as C2 infrastructure in multi-stage campaign targeting South Korean 🇰🇷 organizations. Attack chain uses obfuscated LNK files, PowerShell LOLBins, and legitimate cloud platforms to evade detection while maintaining persistent access.
Dark Night (@dark_night263) 's Twitter Profile Photo

BypassAV — Techniques Map for AV/EDR Evasion A structured map of essential techniques used to evade AV & EDR: • Execution methods • Memory-based evasion • Living-off-the-land (LOLBins) • Detection blind spots Focus on techniques, not tools. github.com/matro7sh/Bypas…

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Huntress researchers Anna Pham & Michael Tigges write about having observed the use of Nightmare-Eclipse tooling - including BlueHammer, RedSun and UnDefend - during a real-world intrusion investigation. huntress.com/blog/nightmare…

Huntress researchers Anna Pham & Michael Tigges write about having observed the use of Nightmare-Eclipse tooling - including BlueHammer, RedSun and UnDefend - during a real-world intrusion investigation. huntress.com/blog/nightmare…
David Koepi (@davidkoepi) 's Twitter Profile Photo

[BinaryDefense] Chasing Phantoms: How a Multi-Stage Stealer Abuses Signed Binaries to Disappear binarydefense.com/resources/blog…

Dark Night (@dark_night263) 's Twitter Profile Photo

🧠 Malware Analysis Resource Hub (Curated List) Awesome Malware Analysis: tools + datasets + labs • Sandboxes, RE, memory forensics • Malware samples & corpora • IOC & threat intel resources • Detection + YARA tools • Domain & network analysis github.com/rshipp/awesome…

David Koepi (@davidkoepi) 's Twitter Profile Photo

[KrebsOnSecurity] ‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty krebsonsecurity.com/2026/04/scatte…

David Koepi (@davidkoepi) 's Twitter Profile Photo

Trigona Affiliates Deploy Custom Exfiltration Tool to Streamline Data Thefthttps://www.security.com/threat-intelligence/trigona-exfiltration-custom

David Koepi (@davidkoepi) 's Twitter Profile Photo

[Symantec] Trigona Affiliates Deploy Custom Exfiltration Tool to Streamline Data Thefthttps://www.security.com/threat-intelligence/trigona-exfiltration-custom

David Koepi (@davidkoepi) 's Twitter Profile Photo

[AnyRun] Inside agenteV2: How Brazilian Attackers Use Fake Court Summons to Steal Banking Credentials in Real Time any.run/cybersecurity-…

David Koepi (@davidkoepi) 's Twitter Profile Photo

[SenitnelOne] fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet sentinelone.com/labs/fast16-my…

David Koepi (@davidkoepi) 's Twitter Profile Photo

[Chainalysis] U.S. Government Unveils Sweeping Enforcement Actions Against Southeast Asian Scam Centers and Crypto Fraud Networks chainalysis.com/blog/asian-sca…

Mr.Z (@zux0x3a) 's Twitter Profile Photo

github.com/MWR-CyberSec/V… A credential extraction BOF for Veeam Backup and Replication and Veeam One by Stephen Munro and Logan Kroeger from MWR CyberSec

LAB52 (@lab52io) 's Twitter Profile Photo

Download our 142-page #EasterBunny report (open access): EasterBunny: advanced espionage artifacts attributed to APT29 lab52.io/blog/easterbun… #APT29

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Mitesh Wani at Zscaler ThreatLabz details how attackers exploited OpenClaw’s skill architecture. The campaign was designed to trick AI agents or developers into executing hidden payloads, leading to the deployment of Remcos RAT and GhostLoader. zscaler.com/blogs/security…

Mitesh Wani at Zscaler ThreatLabz details how attackers exploited OpenClaw’s skill architecture. The campaign was designed to trick AI agents or developers into executing hidden payloads, leading to the deployment of Remcos RAT and GhostLoader. zscaler.com/blogs/security…