hasherezade(@hasherezade) 's Twitter Profileg
hasherezade

@hasherezade

Programmer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)

ID:1590754944

linkhttps://hasherezade.net calendar_today13-07-2013 11:17:31

23,3K Tweets

84,1K Followers

843 Following

Follow People
vx-underground(@vxunderground) 's Twitter Profile Photo

We are approaching 300,000 followers on Twitter.

This is an astronomically large number that we never expected to reach.

Some thoughts and feelings:

When vx-underground was first created in May, 2019 the initial goal was to 'revive the VX-scene' – with the hopes that with

account_circle
Ax Sharma(@Ax_Sharma) 's Twitter Profile Photo

A GitHub flaw lets attackers upload executables that appear to be hosted on a company's official repo, such as Microsoft's—without the repo owner knowing anything about it.

The following URLs, for example, make it seem like these ZIPs are present on Microsoft's source code repo:

A GitHub flaw lets attackers upload executables that appear to be hosted on a company's official repo, such as Microsoft's—without the repo owner knowing anything about it. The following URLs, for example, make it seem like these ZIPs are present on Microsoft's source code repo:
account_circle
0xor0ne(@0xor0ne) 's Twitter Profile Photo

Constantly updated collection of links to blog posts, write-ups and papers related to cybersecurity, reverse engineering and exploitation

github.com/0xor0ne/awesom…

Constantly updated collection of links to blog posts, write-ups and papers related to cybersecurity, reverse engineering and exploitation github.com/0xor0ne/awesom… #cybersecurity #infosec
account_circle
Binni Shah(@binitamshah) 's Twitter Profile Photo

Exploiting the libwebp Vulnerability, Part 1 : Playing with Huffman Code : darknavy.org/blog/exploitin…

Exploiting the libwebp Vulnerability, Part 2: Diving into Chrome Blink : darknavy.org/blog/exploitin…

Exploiting the libwebp Vulnerability, Part 1 : Playing with Huffman Code : darknavy.org/blog/exploitin… Exploiting the libwebp Vulnerability, Part 2: Diving into Chrome Blink : darknavy.org/blog/exploitin…
account_circle
Mandiant(@Mandiant) 's Twitter Profile Photo

Mandiant reveals that a “hacktivist” persona created by APT44, has recently targeted & disrupted U.S. and Polish water utilities, as well as a French dam.

Read more on our latest findings here: bit.ly/4aS7RYe

Mandiant reveals that a “hacktivist” persona created by APT44, has recently targeted & disrupted U.S. and Polish water utilities, as well as a French dam. Read more on our latest findings here: bit.ly/4aS7RYe #Mandiant #APT44
account_circle
0xor0ne(@0xor0ne) 's Twitter Profile Photo

Hunting and analysing (Windows) vulnerable kernel drivers by Takahiro Haruyama (VMware)

blogs.vmware.com/security/2023/…

Hunting and analysing (Windows) vulnerable kernel drivers by Takahiro Haruyama (@VMware) blogs.vmware.com/security/2023/… #Windows
account_circle
Alex Matrosov(@matrosov) 's Twitter Profile Photo

Binarly advisories are up and documenting detailed guidance for the security community, as always.

OOB Read in BMC firmware - Medium (CWE-125)
🔥BRLY-2024-002 binarly-io.webflow.io/advisories/brl…
🔥BRLY-2024-003 binarly-io.webflow.io/advisories/brl…
🔥BRLY-2024-004 binarly-io.webflow.io/advisories/brl…

Binarly advisories are up and documenting detailed guidance for the security community, as always. OOB Read in BMC firmware - Medium (CWE-125) 🔥BRLY-2024-002 binarly-io.webflow.io/advisories/brl… 🔥BRLY-2024-003 binarly-io.webflow.io/advisories/brl… 🔥BRLY-2024-004 binarly-io.webflow.io/advisories/brl…
account_circle
Costin Raiu(@craiu) 's Twitter Profile Photo

The OpenJS Foundation spotted three other 'Jia Tan'-like supply chain attack attempts. One targeted OpenJS and two other targeted unnamed 'popular JavaScript projects'. Unclear if related to the XZ supply chain attack or how recent they are. Would be nice to get a bit more

account_circle
vx-underground(@vxunderground) 's Twitter Profile Photo

Awhile back we heard rumors of a Telegram RCE 0day. We brushed it off as silly memes. Turns out the 0day was 100% real and you're all probably pwned.

It was unveiled on XSS. Nerds celebrated

(joking about pwned part... kind of)

More information: bleepingcomputer.com/news/security/…

account_circle
Yarden Shafir(@yarden_shafir) 's Twitter Profile Photo

There is still time to register for my new hands-on debugging class next month!
I’m not likely to teach this class again soon so if you want to take it, now is your chance 😊

There is still time to register for my new hands-on debugging class next month! I’m not likely to teach this class again soon so if you want to take it, now is your chance 😊
account_circle
Geeknik's {{☀️}} Lab(@geeknik) 's Twitter Profile Photo

Jigsaw is a tool to obfuscate raw shell code by outputting randomized shell code, a lookup table, and a C/C++ stub to reassemble it at runtime.

github.com/RedSiege/Jigsaw

account_circle
Niebezpiecznik(@niebezpiecznik) 's Twitter Profile Photo

🚨 CYBERALERT 🚨 Polacy masowo otrzymują SMS-y informujące o wpisie do rejestru długów. Co ciekawe, SMS-y zawierają poprawne imię i nazwisko.

⚠️ Jeśli ktoś pobierze zalinkowany raport, to zostanie mu naliczona opłata w wysokości 1299zł.

Kim jest nadawca SMS-ów i skąd ma dane?

🚨 CYBERALERT 🚨 Polacy masowo otrzymują SMS-y informujące o wpisie do rejestru długów. Co ciekawe, SMS-y zawierają poprawne imię i nazwisko. ⚠️ Jeśli ktoś pobierze zalinkowany raport, to zostanie mu naliczona opłata w wysokości 1299zł. Kim jest nadawca SMS-ów i skąd ma dane?
account_circle
Niebezpiecznik(@niebezpiecznik) 's Twitter Profile Photo

Mamy kolejną falę spoofingu telefonicznego. Najnowszymi ofiarami Sławomir Mentzen i Krzysztof Stanowski

Pomimo wejścia w życie ustawy antyspoofingowej wciąż każdy może dzwonić z cudzych numerów telefonów, np. dziennikarzy czy polityków. To bardzo proste i dalej możliwe do osiągnięcia

account_circle
⁵⁄₉(@fiveoutofnine) 's Twitter Profile Photo

Random useful information: Twitter IDs are 63 bits (minus sign bit), and the first 41 are the timestamps since ≈Nov. 3, 2010

Random useful information: Twitter IDs are 63 bits (minus sign bit), and the first 41 are the timestamps since ≈Nov. 3, 2010
account_circle
Yarden Shafir(@yarden_shafir) 's Twitter Profile Photo

I’ve been outed as a chronic procrastinator. So I’ll use this chance to ask - what do you want me to talk about?
Let me know about any topics you think are interesting and would like to hear me talk about 😊

account_circle
Jazi(@h2jazi) 's Twitter Profile Photo

It seems is using CVE-2023-3881 to attack Ukraine. This sample was submitted to VT from Poland.
d8ccaef116cada9c558f9e912d5cf7ef2978082611e677f6f55ca233f47a2f68

It seems #Gamaredon #APT is using CVE-2023-3881 to attack Ukraine. This sample was submitted to VT from Poland. d8ccaef116cada9c558f9e912d5cf7ef2978082611e677f6f55ca233f47a2f68
account_circle
Alex Matrosov(@matrosov) 's Twitter Profile Photo

During the last two weeks, we have been focused on detailed analysis and validation of the existing public information. Today, we want to share our validated results and interesting new discoveries on .

The REsearch is in progress ...

account_circle
SpecterOps 🇺🇦(@SpecterOps) 's Twitter Profile Photo

While Microsoft's User Account Control is not defined as a security boundary, bypassing UAC is still something attackers frequently do. Check out this blog post from Matt Nelson detailing one method for bypassing UAC using App Paths. ghst.ly/43U8XQY

account_circle