
yed
@frdfzi
Followers
1K
Following
5K
Media
232
Statuses
5K
Security researcher @ GReAT Kaspersky. Tweets and opinions expressed are my own.
Nisa
Joined March 2018
RT @williballenthin: I’ve been discovering Reverse Engineering tools and techniques by following IDA Pro plugin updates, which I publish vi….
0
15
0
RT @_revng: 🔥 So, at DEF CON there was a talk about deobfuscation: VMDragonSlayer by @Van1sh_BSidesIT. The author released the code and th….
0
50
0
RT @zodiacon: I just released a new video: How WSL 1 Works. In this video, I explain how Windows Subsystem for Linux version 1 runs ELF bin….
trainsec.net
Windows Subsystem for Linux (WSL) first appeared in Windows 10 (Anniversary Update, 1607). It enables Linux binaries to run directly on Windows without recompilation. This capability is often...
0
49
0
RT @TheSAScon: ⏰ Your crash course in #CTF prep starts in 2 hours! Don’t forget to join the webinar hosted by @bzvr_ - he will share prac….
0
2
0
RT @malware_owl: Not yet public but YaraXGUI would soon display tags from rules if any :D So far, I find this to be very satisfying when te….
0
4
0
RT @TheSAScon: ⏰ Remember those GTA missions where you have to complete a task before time runs out? .Now you’re in one of those situations….
0
2
0
RT @elma_ios: Have you ever wondered what happens if we break compiler conventions? I was able to obfuscate the control flow of a program a….
blog.elmo.sg
Breaking compiler conventions to hide code and obfuscate control flow by modifying non-volatile registers.
0
35
0
RT @ricomanifesto: Chinese APT group APT41 hits African government IT services and used a compromised internal SharePoint as a C2. This rep….
securelist.com
Kaspersky experts analyze an incident that saw APT41 launch a targeted attack on government IT services in Africa.
0
5
0
RT @nanosec_asia: Welcoming @frdfzi as Parallel Pulse @nanosec_asia Review Board Member. Fareed is a Security Researcher at Kaspersky focu….
0
10
0
RT @SaurabhSha15: We recently analyzed GodRAT, a new malware strain derived from Gh0stRAT, actively targeting financial organizations. More….
securelist.com
Kaspersky experts analyze GodRAT, a new Gh0st RAT-based tool attacking financial firms. It is likely a successor of the AwesomePuppet RAT connected to the Winnti group.
0
5
0
RT @kaspersky: Challenge your team now! 💻. Kaspersky{CTF} is your chance to test your skills in the real world. On August 30, a 24-hour onl….
0
6
0
Cyber_Safety_Checklist_2025.rar . #ToneShell uploaded from SG in 2025-07-30. Is HoneyMyte (Mustang Panda) currently targeting Singapore? I'm not sure. CC: @douglasmun.
Hotel Booking Request.7z. #ToneShell's HoneyMyte, uploaded from Singapore last month.
1
10
43
I'm sharing my note, containing little tips and checklist on how we can attribute a piece of malware or a campaign to certain threat groups. Although it does not cover all methodologies but I think it's good for beginners to learn this topic. 👍🏻.
9
59
129
RT @eversinc33: As a little follow up, I wrote a small blog post/tutorial on how to reverse engineer windows drivers with IDA - this is aim….
0
128
0
RT @lazarusholic: "Leaked North Korean Linux Stealth Rootkit Analysis" published by @sandflysecurity. #Kimsuky, #DPRK, #CTI .
sandflysecurity.com
Leaked North Korean Linux Stealth Rootkit Analysis from Phrack Magazine
0
11
0