
Adrien B
@Int2e_
Followers
2K
Following
617
Media
10
Statuses
499
Malware research and threat intel ex #DFIR responder at @Mandiant
Joined June 2014
RT @Cyber_O51NT: A recent analysis revealed MystRodX, a sophisticated C++ backdoor, employing dual-mode activation and advanced encryption,….
blog.xlab.qianxin.com
背景介绍 2025年6月6日,Xlab大网威胁感知系统监测到 IP 139.84.156.79正在传播一个VT低检测 4/65,名为dst86.bin的可疑ELF文件。多引擎检测模块将该文件标识为MIRAI僵尸网络,但AI研判模块却没有给出相应的结果。这个“异常”引起了我们的兴趣,经过分析确认它是Dropper,最终会释放出一个全新的后门木马,和Mirai完全无关,多家杀软将其标记为Mira...
0
18
0
RT @lukOlejnik: Meta and Russian Yandex engaged in unprecedented internet tracking practices, likely illegal with EU data protection law. C….
0
254
0
RT @MalwareRE: The Microsoft Threat Intelligence Center (MSTIC) is looking for malware reverse engineers and security researchers to join o….
0
39
0
RT @MsftSecIntel: Based on our findings and those reported by governments and other security vendors, Microsoft Threat Intelligence assesse….
0
128
0
RT @MsftSecIntel: Microsoft identified multiple vulnerabilities in the open-source platform OpenVPN, integrated into millions of devices wo….
0
198
0
RT @matthieu_faou: We are looking for a strategic threat intel analyst to join @ESETresearch. Interested in cyber-espionage and geopolitics….
linkedin.com
Today’s top 1,000+ Intelligence Officer jobs in United States. Leverage your professional network, and get hired. New Intelligence Officer jobs added daily.
0
42
0
RT @George_Kurtz: CrowdStrike is actively working with customers impacted by a defect found in a single content update for Windows hosts. M….
0
6K
0
RT @plusvic: Welcome to the future of YARA: .
virustotal.github.io
For over 15 years, YARA has been growing and evolving until it became an indispensable tool in every malware researcher’s toolbox.
0
152
0
RT @greglesnewich: #100DaysofYARA Day 07 - another condition only rule this time looking for the HTTPSnoop and PipeSnoop families found by….
0
14
0
RT @fr0gger_: #100DaysOfYara Day 6: Yara can be used to access specific data at a given position. 👇. This feature is often used to identify….
0
31
0
RT @greglesnewich: #100DaysofYARA Day 6 . sometimes our pals in TA404/Zinc/Temp.HERMIT/Diamond Sleet reuse export names and add a dubya ("W….
0
12
0
RT @milenkowski: [1/4] Joined by @vmptrst (@PwC) and @MsftSecIntel, we release attribution information on the Sandman #APT, first revealed….
sentinelone.com
SentinelLABS, Microsoft, and PwC threat intelligence researchers provide attribution-relevant information on the Sandman APT cluster.
0
24
0
RT @MsftSecIntel: Microsoft has uncovered a supply chain attack by North Korean threat actor Diamond Sleet (ZINC) involving the modificatio….
microsoft.com
Microsoft has uncovered a supply chain attack by Diamond Sleet involving a malicious variant of an application developed by CyberLink Corp.
0
216
0
A few weeks ago I was honored to speak at @labscon_io . Great people, great talks, great venue. I honestly could not suggest any improvements except something closer to CET timezone!.
1
1
26
RT @MsftSecIntel: Microsoft has identified targeted attacks against the defense sector in Ukraine and Eastern Europe by the threat actor Se….
cert.gov.ua
Урядова команда реагування на комп’ютерні надзвичайні події України, яка функціонує в складі Державної служби спеціального зв’язку та захисту інформації України.
0
144
0
RT @_CERT_UA: CERT-UA in collab w/ @MsftSecIntel investigated UAC-0024 (susp. #Turla) using CAPIBAR & KAZUAR to target UA GOV entities. De….
cert.gov.ua
Урядова команда реагування на комп’ютерні надзвичайні події України, яка функціонує в складі Державної служби спеціального зв’язку та захисту інформації України.
0
29
0