frdfzi Profile Banner
yed Profile
yed

@frdfzi

Followers
1K
Following
5K
Media
236
Statuses
5K

Tweets and opinions expressed are my own.

Nisa
Joined March 2018
Don't wanna be here? Send us removal request.
@_RastaMouse
Rasta Mouse
9 days
Best deal of the year...
@_ZeroPointSec
Zero-Point Security
9 days
We now have an RTO & RTO II bundle: https://t.co/R4LXELNR6s At 40% off right now, this is an absolute steal.
3
5
25
@unpacker
Seongsu Park
10 days
South Korea's largest cryptocurrency exchange, Upbit, has confirmed a major security breach involving the unauthorized withdrawal of 54 Billion KRW (~$39M) in Solana-based assets. Key Details: ▶️Incident Confirmation: The breach was acknowledged on November 27, 2025, at 04:42
3
20
56
@IntCyberDigest
International Cyber Digest
12 days
‼️ Secret Chinese documents have been leaked, revealing their internal cyberwarfare training program. The documents show a focus on products from Cisco, Fortinet, WatchGuard, and Juniper as primary operational targets. China has built digital cyber ranges that allow operatives
20
256
1K
@blackorbird
blackorbird
15 days
Massive APT35 (Charming Kitten) internal leak exposes a highly mature, quota-driven cyber-espionage machine focused on long-term mailbox persistence & HUMINT collection. Core technical tradecraft is Exchange-centric & credential-obsessed: Initial Access & Exploitation • Heavy
@blackorbird
blackorbird
2 months
An Insider Look At The APT35 Operations https://t.co/9dUrE4WWh4
6
95
318
@unpacker
Seongsu Park
17 days
These guys published a great report on Operation DreamJob by the DPRK threat actor, and I can relate to how hard it is to build that malware relationship table. Kudos to the team!
@CERTCyberdef
CERT Orange Cyberdefense
17 days
🔎Our CERT is releasing a new technical report on 🇰🇵Operation #DreamJob, focusing on recent evolution in its tooling. Following an IR engagement at a large manufacturing client based in 🇪🇺, we investigated artefacts we attribute to #UNC2970. ➡️Full blog: https://t.co/o8px0jZmfc
0
16
59
@blackorbird
blackorbird
1 month
#bitter Group used the WinRAR vulnerability CVE-2025-6218. When users decompress with a vulnerable WinRAR version, the special paths (constructed with ".. " spaces) in the compressed package release the malicious file Normal.dotm to
2
42
142
@Hesamation
ℏεsam
28 days
he’s right on point. you can actually LOVE studying new subjects. here’s how (i broke down 26 minutes of video): > approach it with curiosity like a kid. gaslight yourself into having that curiosity, it produces dopamine, and brings focus and enjoyment. be like Feynman. > track
12
1K
10K
@davepl1968
Dave W Plummer
30 days
Knowing how to write assembly is a skill you should learn, and these guys have a great resource for you! I've debugged 10,000 lines of assembly for every line I've ever written... but writing assembly from scratch is a core computer science skill, I believe: even if you never
@FFmpeg
FFmpeg
30 days
Our assembly lessons are trending on @github ! We have nearly 10k stars.
72
271
4K
@malware_owl
malware Owl
1 month
YARA-X but ported to PyQT6. Experimenting with different themes :D
1
3
12
@fr0gger_
Thomas Roccia 🤘
1 month
Awesome new threat report from Google Threat Intel Group documenting how threat actors are leveraging Gemini. A lot of information and actionable avalable in the report! Great work 👌 https://t.co/0ktEQbUhmq
4
139
526
@virusbtn
Virus Bulletin
1 month
Check Point Research demonstrates how generative AI can speed up reverse engineering from days to hours by exporting IDA data to ChatGPT for deep static analysis. https://t.co/nhfXopg5vw
1
97
392
@RedDrip7
RedDrip Team
1 month
#APT Since the disclosure of the #ZipperDown vulnerability in 2018, this is the first observed case of its in-the-wild exploitation by APT groups. Northeast Asian threat actors used it to target Android devices of individuals in North Korea and Northeast China.
1
13
33
@MsftSecIntel
Microsoft Threat Intelligence
1 month
Microsoft Incident Response – Detection and Response Team (DART) uncovered SesameOp, a new backdoor that uses the OpenAI Assistants API for C2. DART shared the findings with OpenAI, who identified and disabled an API key and associated account. https://t.co/xflPrSQReI SesameOp
Tweet card summary image
microsoft.com
Microsoft Incident Response – Detection and Response Team (DART) researchers uncovered a new backdoor that is notable for its novel use of the OpenAI Assistants Application Programming Interface...
5
63
192
@LocalBateman
Your Typical Local Man
1 month
164
5K
49K
@craiu
Costin Raiu
1 month
Cryptocurrency wallet addresses associated with #CharmingKitten / #APT35 operations:
2
25
110
@nanosec_asia
NanoSec Asia
1 month
🔥 Parallel Pulse 2025 @nanosec_asia is coming! HRDC Claimable Training + Conference for defenders, researchers & builders. https://t.co/ZXy0cHrO9Q HRDC Registration: https://t.co/mca0XEJamn Normal Conference Registration: https://t.co/JUdp71IdH4
0
5
5
@bl4sty
blasty
1 month
thanks to everyone who attended my #TheSAS2025 talk "Typographic hit job: when fonts pull the trigger". 🙏 I've written an accompanying blogpost that goes over all the details:
Tweet card summary image
haxx.in
Last year we (PHP HOOLIGANS) competed in Pwn2Own (ireland, 2024) once again. One of our (succesful) entries was against a little pet peeve target of mine, the CANON ImageCLASS printer. In this post...
4
42
135
@5mukx
Smukx.E
1 month
BYOVD to the next level (part 1). exploiting a vulnerable driver (CVE-2025-8061) TLDR; This blog post is about how to abuse a vulnerable driver to gain access to Ring-0 capabilities. https://t.co/sAnlLn9rXS
0
47
193