Volexity(@Volexity) 's Twitter Profileg
Volexity

@Volexity

A security firm providing Incident Response, Proactive Threat Assessments, Trusted Advisory, and Threat Intelligence

ID:1847379325

linkhttps://www.volexity.com calendar_today09-09-2013 15:18:24

717 Tweets

7,6K Followers

7 Following

Follow People
Andrew Case(@attrc) 's Twitter Profile Photo

Join us at Black Hat Vegas training in August to learn how to triage modern malware using volatility 3!

- blackhat.com/us-24/training…

- blackhat.com/us-24/training…

account_circle
Volexity(@Volexity) 's Twitter Profile Photo

Learn how to perform detection + triage of sophisticated malware against Windows 10+ systems using from Volexity Director of Research & volatility core developer Andrew Case at Bsidesseattle on Apr 27!

bsidesseattle.com/2024-schedule.…

Learn how to perform detection + triage of sophisticated malware against Windows 10+ systems using #Volatility3 from @Volexity Director of Research & @volatility core developer @attrc at @bsidesseattle on Apr 27! bsidesseattle.com/2024-schedule.… #dfir #memoryforensics #memoryanalysis
account_circle
Volexity(@Volexity) 's Twitter Profile Photo

Learn how to perform detection + triage of sophisticated malware against Windows 10+ systems using from Volexity Director of Research & volatility core developer Andrew Case at Bsidesseattle on Apr 27!

bsidesseattle.com/2024-schedule.…

Learn how to perform detection + triage of sophisticated malware against Windows 10+ systems using #Volatility3 from @Volexity Director of Research & @volatility core developer @attrc at @bsidesseattle on Apr 27! bsidesseattle.com/2024-schedule.… #dfir #memoryforensics #memoryanalysis
account_circle
5ck(@5ck) 's Twitter Profile Photo

🧵Last week we (Volexity) identified and reported in-the wild (ITW) exploitation of CVE-2024-3400 affecting Palo Alto GlobalProtect 👇

volexity.com/blog/2024/04/1…

account_circle
Steven Adair(@stevenadair) 's Twitter Profile Photo

Our team at Volexity has identified a new 0day exploited in the wild. This time we caught a threat actor using an unauthenticated RCE in Palo Alto Networks GlobalProtect. It has been assigned CVE-2024-3400 and is covered in this Palo Alto Networks advisory security.paloaltonetworks.com/CVE-2024-3400

account_circle
Lindsey O'Donnell Welch(@LindseyOD123) 's Twitter Profile Photo

Researchers with Volexity discovered exploitation of CVE-2024-3400 on April 10 - however, researchers said that the earliest evidence of attempted exploitation tracks back to March 26.

duo.com/decipher/palo-…

account_circle
Steven Adair(@stevenadair) 's Twitter Profile Photo

Volexity Palo Alto Networks We have seen limited exploitation but impact at multiple customers. We first detected this just two days ago. Impressive response from the Palo Alto Networks team, as they quickly worked with us and have now pushed a Threat Protection signature with a fix to come April 14.

account_circle
Steven Adair(@stevenadair) 's Twitter Profile Photo

Our blog with details on the exploitation of CVE-2024-3400 is up! An incredibly fast turn around from our detecting a breach to smashing threat actor capabilities. Huge shout out to our Volexity team and our awesome customers & a great response from the Palo Alto Networks team.

account_circle
Volexity(@Volexity) 's Twitter Profile Photo

Our latest blog post details Volexity's identification & incident response associated with the Palo Alto Networks GlobalProtect vuln, assigned CVE-2024-3400, that the team found being exploited in the wild.

Read more here: volexity.com/blog/2024/04/1…

account_circle
Anchored Narratives(@AnchoredNarrat1) 's Twitter Profile Photo

I was interviewed by ForensicFocus about my job at Volexity, how I got introduced into the field of , the power of memoryforenics and the importance of evidence tampering in the case. A trip down memory forensics lane.

account_circle