RevEng.ai Profile
RevEng.ai

@RevEng_AI

Followers
149
Following
11
Media
2
Statuses
18

Reverse Engineering meets Artificial Intelligence

Joined May 2022
Don't wanna be here? Send us removal request.
@RevEng_AI
RevEng.ai
26 days
🚨 New blog post from @RevEng_AI! 🚨 https://t.co/FlExySK3ef We continue exploring the KorPlug malware family, focusing on its complex second-stage execution. This analysis outlines methods to bypass advanced obfuscation and extract key intelligence. #revengai
Tweet card summary image
blog.reveng.ai
Executive Summary This analysis represents the second instalment in a comprehensive examination of the KorPlug malware family. Previous reporting detailed the initial loading vector utilising DLL...
1
4
9
@RevEng_AI
RevEng.ai
2 months
πŸŽ‰ Exciting News! πŸŽ‰ Are you into Malware, AI, or Exploits? If so, you're in for a treat with Best Served Cold, the Podcast that delves into these fascinating topics! A big thank you to Anuj Soni for joining us and being a part of the inaugural episode of this new podcast by
Tweet media one
0
1
4
@RevEng_AI
RevEng.ai
3 months
Check Out https://t.co/pqQMUEbmYH's latest writeup on KorPlug Unmasking KorPlug: Journey into a Chinese Cyberattack - Part 1 https://t.co/os1v2xzRLD
Tweet media one
0
1
2
@RevEng_AI
RevEng.ai
4 months
So begins our first ever In-Person CTF. The event is running for a good few hours so late comers are still welcome! There is still time if you are keen to join us for the CTF and Networking drinks after! https://t.co/iUjvLKHx81
Tweet card summary image
eventbrite.co.uk
Join us for a fun evening of hands-on CTF challenges, AI, and networking over drinks at our RevEng.AI In-Person CTF & Happy Hour event!
0
0
0
@RevEng_AI
RevEng.ai
5 months
Exciting week ahead for the https://t.co/pqQMUEbUOf team in San Francisco at BSidesSF and RSA Conference! We're giving out exclusive access to the https://t.co/pqQMUEbUOf product suite available to in person @BSidesSFCTF attendees - reach out to learn more. Looking forward to
0
0
1
@RevEng_AI
RevEng.ai
5 months
πŸ“£ We're hosting a CTF Event in Washington DC πŸ“£ Join us on the 12th of May for the inaugural https://t.co/pqQMUEbmYH CTF at the stunning Sands Capital building. Experience a sneak peek into https://t.co/pqQMUEbmYH's cutting-edge AI platform. https://t.co/iUjvLKHx81
Tweet card summary image
eventbrite.co.uk
Join us for a fun evening of hands-on CTF challenges, AI, and networking over drinks at our RevEng.AI In-Person CTF & Happy Hour event!
0
2
5
@RevEng_AI
RevEng.ai
6 months
During continued analysis of #LummaStealer @RevEng_AI uncovered an ongoing campaign using stealthy DLL hijacking tactics, different from the previously documented ClickFix method. Read our latest findings here: https://t.co/NdJdlz0RhW #CyberSecurity #ThreatIntel #MalwareAnalysis
blog.reveng.ai
Executive Summary In February 2025, the RevEngAI team observed an ongoing LummaStealer campaign that employed a distinct approach compared to the ClickFix method detailed in the previous instalment...
0
2
3
@RevEng_AI
RevEng.ai
7 months
🚨 New Blog Alert! 🚨 LummaStealer is hijacking reCAPTCHAs to lure victims in & steal sensitive data. How does it work? And what’s ClickFix got to do with it? πŸ”Ž Read the deep dive by @RevEngAI πŸ‘‡ πŸ”— https://t.co/6rhA1BQ7Ub #CyberSecurity #MalwareAnalysis #LummaStealer
blog.reveng.ai
Executive Summary Throughout 2024, RevEng.AI has been actively monitoring LummaStealer as part of its mission to uncover and analyse emerging threats across the commodity malware landscape. In mid...
0
1
1
@_DavidRushmer
David Rushmer
8 months
With LummaStealer reCAPTCHA'ing people's attention, @RevEng_AI wanted to share research conducted around this particular malware. If you enjoy part 1, remember to keep an eye out for part 2. If anyone would like to see a demo of https://t.co/pnoL2S6lCT you can always just
Tweet card summary image
reveng.ai
The AI powered binary analysis platform for reverse engineering and malware analysis.
1
2
4
@RevEng_AI
RevEng.ai
10 months
Excited to showcase the release of our new AI Decompiler at https://t.co/pqQMUEbmYH, offering advanced capabilities to malware analysts and security engineers when reverse engineering.
Tweet card summary image
blog.reveng.ai
Introduction The challenge of converting low-level assembly code back into human-readable source code is a cornerstone problem in reverse engineering. In this post, we summarise recent work done at...
0
1
4
@LloydLabs
Lloyd Davies
1 year
We are hiring a Malware Reverse Engineer Intern at RevEng 😎 Must have a strong interest in reverse engineering, tools, techniques and malware analysis. Public analysis reports are definitely a plus! πŸ‡¬πŸ‡§ only. πŸ“₯ DM me for more information πŸ”—
2
27
101
@RevEng_AI
RevEng.ai
1 year
Latrodectus borrows from the open-source BlackLotus malware. Delivered by BRC4, and despite being targeted by the international law enforcement effort Operation Endgame, Latrodectus has swiftly rebuilt its infrastructure. See our analysis for details
Tweet card summary image
blog.reveng.ai
Explore the resumed activity conducted by Latrodectus download and executed by BRC4 post Operation Endgame
0
3
8
@PlexalCyber
Plexal Cyber
1 year
Attending #CyberUK2024 from @NCSC on 13-15 May! Hosting CyberUK Startups Zone at ICC Birmingham with cyber alumni like @AngokaCyber @cybertzar @cyntegra @GoldilockSecure @LupovisDefence @memcrypt @RevEng_AI @thinkcyberuk, ExactTrak and Sitehop. Read more: https://t.co/M3bEveFR58
Tweet media one
0
2
7
@NCSC
NCSC UK
2 years
Big #NCSCForStartups news incoming 🚨 The latest cohort of businesses have joined the programme. A huge welcome to @AcubedITLTD, coc00n, @cybertzar, @memcrypt and @RevEng_AI. From risk management to ransomware detection, learn more about what they do πŸ‘‡ https://t.co/c7Zg4udV6u
Tweet card summary image
ncsc.gov.uk
Meet our newest startups
@PlexalCyber
Plexal Cyber
2 years
Welcoming @AcubedITLTD, coc00n, @cybertzar, @memcrypt and @RevEng_AI to #NCSCForStartups with @NCSC! As reported by @fionaalston at @Tech_EU, they join a community that's raised over Β£500m and created 1,600 jobs! 🌐 Read all about it πŸ“°πŸ‘‡
2
8
14
@lumjjb
Brandon Lum
3 years
A practical example of using SBOMs to check for vulnerabilities with the Kubernetes SPDX docs and https://t.co/p8ZZntkFJw... Together with @halbecaf and tooling from Gary O'Neall! @SPDXTeam @sbom_x https://t.co/tWNhXyFoEe
Tweet card summary image
security.googleblog.com
Posted by Brandon Lum and Oliver Chang, Google Open Source Security Team The past year has seen an industry-wide effort to embrace Software ...
1
16
27
@prisec_ml
prisec_ml
3 years
Seminar tomorrow @ 2:30 PM (UK time) Suman Jana (Columbia), "Scalable, Accurate, Robust Binary Analysis with Transfer Learning" Zoom: https://t.co/ziB1Y4os39 Stream:
0
2
8