
RevEng.ai
@RevEng_AI
Followers
149
Following
11
Media
2
Statuses
18
Reverse Engineering meets Artificial Intelligence
Joined May 2022
π¨ New blog post from @RevEng_AI! π¨ https://t.co/FlExySK3ef We continue exploring the KorPlug malware family, focusing on its complex second-stage execution. This analysis outlines methods to bypass advanced obfuscation and extract key intelligence. #revengai
blog.reveng.ai
Executive Summary This analysis represents the second instalment in a comprehensive examination of the KorPlug malware family. Previous reporting detailed the initial loading vector utilising DLL...
1
4
9
π Exciting News! π Are you into Malware, AI, or Exploits? If so, you're in for a treat with Best Served Cold, the Podcast that delves into these fascinating topics! A big thank you to Anuj Soni for joining us and being a part of the inaugural episode of this new podcast by
0
1
4
Check Out https://t.co/pqQMUEbmYH's latest writeup on KorPlug Unmasking KorPlug: Journey into a Chinese Cyberattack - Part 1 https://t.co/os1v2xzRLD
0
1
2
So begins our first ever In-Person CTF. The event is running for a good few hours so late comers are still welcome! There is still time if you are keen to join us for the CTF and Networking drinks after! https://t.co/iUjvLKHx81
eventbrite.co.uk
Join us for a fun evening of hands-on CTF challenges, AI, and networking over drinks at our RevEng.AI In-Person CTF & Happy Hour event!
0
0
0
Exciting week ahead for the https://t.co/pqQMUEbUOf team in San Francisco at BSidesSF and RSA Conference! We're giving out exclusive access to the https://t.co/pqQMUEbUOf product suite available to in person @BSidesSFCTF attendees - reach out to learn more. Looking forward to
0
0
1
π£ We're hosting a CTF Event in Washington DC π£ Join us on the 12th of May for the inaugural https://t.co/pqQMUEbmYH CTF at the stunning Sands Capital building. Experience a sneak peek into https://t.co/pqQMUEbmYH's cutting-edge AI platform. https://t.co/iUjvLKHx81
eventbrite.co.uk
Join us for a fun evening of hands-on CTF challenges, AI, and networking over drinks at our RevEng.AI In-Person CTF & Happy Hour event!
0
2
5
During continued analysis of #LummaStealer @RevEng_AI uncovered an ongoing campaign using stealthy DLL hijacking tactics, different from the previously documented ClickFix method. Read our latest findings here: https://t.co/NdJdlz0RhW
#CyberSecurity #ThreatIntel #MalwareAnalysis
blog.reveng.ai
Executive Summary In February 2025, the RevEngAI team observed an ongoing LummaStealer campaign that employed a distinct approach compared to the ClickFix method detailed in the previous instalment...
0
2
3
π¨ New Blog Alert! π¨ LummaStealer is hijacking reCAPTCHAs to lure victims in & steal sensitive data. How does it work? And whatβs ClickFix got to do with it? π Read the deep dive by @RevEngAI π π https://t.co/6rhA1BQ7Ub
#CyberSecurity #MalwareAnalysis #LummaStealer
blog.reveng.ai
Executive Summary Throughout 2024, RevEng.AI has been actively monitoring LummaStealer as part of its mission to uncover and analyse emerging threats across the commodity malware landscape. In mid...
0
1
1
With LummaStealer reCAPTCHA'ing people's attention, @RevEng_AI wanted to share research conducted around this particular malware. If you enjoy part 1, remember to keep an eye out for part 2. If anyone would like to see a demo of https://t.co/pnoL2S6lCT you can always just
reveng.ai
The AI powered binary analysis platform for reverse engineering and malware analysis.
1
2
4
Excited to showcase the release of our new AI Decompiler at https://t.co/pqQMUEbmYH, offering advanced capabilities to malware analysts and security engineers when reverse engineering.
blog.reveng.ai
Introduction The challenge of converting low-level assembly code back into human-readable source code is a cornerstone problem in reverse engineering. In this post, we summarise recent work done at...
0
1
4
We are hiring a Malware Reverse Engineer Intern at RevEng π Must have a strong interest in reverse engineering, tools, techniques and malware analysis. Public analysis reports are definitely a plus! π¬π§ only. π₯ DM me for more information π
2
27
101
Latrodectus borrows from the open-source BlackLotus malware. Delivered by BRC4, and despite being targeted by the international law enforcement effort Operation Endgame, Latrodectus has swiftly rebuilt its infrastructure. See our analysis for details
blog.reveng.ai
Explore the resumed activity conducted by Latrodectus download and executed by BRC4 post Operation Endgame
0
3
8
Attending #CyberUK2024 from @NCSC on 13-15 May! Hosting CyberUK Startups Zone at ICC Birmingham with cyber alumni like @AngokaCyber @cybertzar @cyntegra @GoldilockSecure @LupovisDefence @memcrypt @RevEng_AI @thinkcyberuk, ExactTrak and Sitehop. Read more: https://t.co/M3bEveFR58
0
2
7
Big #NCSCForStartups news incoming π¨ The latest cohort of businesses have joined the programme. A huge welcome to @AcubedITLTD, coc00n, @cybertzar, @memcrypt and @RevEng_AI. From risk management to ransomware detection, learn more about what they do π https://t.co/c7Zg4udV6u
ncsc.gov.uk
Meet our newest startups
Welcoming @AcubedITLTD, coc00n, @cybertzar, @memcrypt and @RevEng_AI to #NCSCForStartups with @NCSC! As reported by @fionaalston at @Tech_EU, they join a community that's raised over Β£500m and created 1,600 jobs! π Read all about it π°π
2
8
14
A practical example of using SBOMs to check for vulnerabilities with the Kubernetes SPDX docs and https://t.co/p8ZZntkFJw... Together with @halbecaf and tooling from Gary O'Neall! @SPDXTeam @sbom_x
https://t.co/tWNhXyFoEe
security.googleblog.com
Posted by Brandon Lum and Oliver Chang, Google Open Source Security Team The past year has seen an industry-wide effort to embrace Software ...
1
16
27
Seminar tomorrow @ 2:30 PM (UK time) Suman Jana (Columbia), "Scalable, Accurate, Robust Binary Analysis with Transfer Learning" Zoom: https://t.co/ziB1Y4os39 Stream:
0
2
8