yed
@frdfzi
Followers
1K
Following
5K
Media
236
Statuses
5K
Tweets and opinions expressed are my own.
Nisa
Joined March 2018
Best deal of the year...
We now have an RTO & RTO II bundle: https://t.co/R4LXELNR6s At 40% off right now, this is an absolute steal.
3
5
25
South Korea's largest cryptocurrency exchange, Upbit, has confirmed a major security breach involving the unauthorized withdrawal of 54 Billion KRW (~$39M) in Solana-based assets. Key Details: ▶️Incident Confirmation: The breach was acknowledged on November 27, 2025, at 04:42
3
20
56
‼️ Secret Chinese documents have been leaked, revealing their internal cyberwarfare training program. The documents show a focus on products from Cisco, Fortinet, WatchGuard, and Juniper as primary operational targets. China has built digital cyber ranges that allow operatives
20
256
1K
Massive APT35 (Charming Kitten) internal leak exposes a highly mature, quota-driven cyber-espionage machine focused on long-term mailbox persistence & HUMINT collection. Core technical tradecraft is Exchange-centric & credential-obsessed: Initial Access & Exploitation • Heavy
6
95
318
These guys published a great report on Operation DreamJob by the DPRK threat actor, and I can relate to how hard it is to build that malware relationship table. Kudos to the team!
🔎Our CERT is releasing a new technical report on 🇰🇵Operation #DreamJob, focusing on recent evolution in its tooling. Following an IR engagement at a large manufacturing client based in 🇪🇺, we investigated artefacts we attribute to #UNC2970. ➡️Full blog: https://t.co/o8px0jZmfc
0
16
59
#bitter Group used the WinRAR vulnerability CVE-2025-6218. When users decompress with a vulnerable WinRAR version, the special paths (constructed with ".. " spaces) in the compressed package release the malicious file Normal.dotm to
2
42
142
he’s right on point. you can actually LOVE studying new subjects. here’s how (i broke down 26 minutes of video): > approach it with curiosity like a kid. gaslight yourself into having that curiosity, it produces dopamine, and brings focus and enjoyment. be like Feynman. > track
12
1K
10K
Knowing how to write assembly is a skill you should learn, and these guys have a great resource for you! I've debugged 10,000 lines of assembly for every line I've ever written... but writing assembly from scratch is a core computer science skill, I believe: even if you never
72
271
4K
YARA-X but ported to PyQT6. Experimenting with different themes :D
1
3
12
Awesome new threat report from Google Threat Intel Group documenting how threat actors are leveraging Gemini. A lot of information and actionable avalable in the report! Great work 👌 https://t.co/0ktEQbUhmq
4
139
526
Check Point Research demonstrates how generative AI can speed up reverse engineering from days to hours by exporting IDA data to ChatGPT for deep static analysis. https://t.co/nhfXopg5vw
1
97
392
#APT Since the disclosure of the #ZipperDown vulnerability in 2018, this is the first observed case of its in-the-wild exploitation by APT groups. Northeast Asian threat actors used it to target Android devices of individuals in North Korea and Northeast China.
1
13
33
Microsoft Incident Response – Detection and Response Team (DART) uncovered SesameOp, a new backdoor that uses the OpenAI Assistants API for C2. DART shared the findings with OpenAI, who identified and disabled an API key and associated account. https://t.co/xflPrSQReI SesameOp
microsoft.com
Microsoft Incident Response – Detection and Response Team (DART) researchers uncovered a new backdoor that is notable for its novel use of the OpenAI Assistants Application Programming Interface...
5
63
192
Effective Malware Analysis using Unicorn | IIJ Security Diary (in English) https://t.co/qSl3ABxeXx
@IIJSECT
sect.iij.ad.jp
Unicorn is a QEMU-based CPU emulator framework presented at Black Hat USA 2015. > GitHub – unicorn-engine/unicorn: Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV,...
0
12
27
🔥 Parallel Pulse 2025 @nanosec_asia is coming! HRDC Claimable Training + Conference for defenders, researchers & builders. https://t.co/ZXy0cHrO9Q HRDC Registration: https://t.co/mca0XEJamn Normal Conference Registration: https://t.co/JUdp71IdH4
0
5
5
thanks to everyone who attended my #TheSAS2025 talk "Typographic hit job: when fonts pull the trigger". 🙏 I've written an accompanying blogpost that goes over all the details:
haxx.in
Last year we (PHP HOOLIGANS) competed in Pwn2Own (ireland, 2024) once again. One of our (succesful) entries was against a little pet peeve target of mine, the CANON ImageCLASS printer. In this post...
4
42
135
It was truly an honor to be part of #TheSAS2025 as a speaker! I and Omar (@beacon_exe) shared some juicy insights from our extensive research on #BlueNoroff's #GhostCall and #GhostHire campaign, part of #SnatchCrypto. You can find our research below. ✅ https://t.co/UVH5GGQHBc
securelist.com
Kaspersky GReAT experts dive deep into the BlueNoroff APT's GhostCall and GhostHire campaigns. Extensive research detailing multiple malware chains targeting macOS, including a stealer suite, fake...
0
16
32
BYOVD to the next level (part 1). exploiting a vulnerable driver (CVE-2025-8061) TLDR; This blog post is about how to abuse a vulnerable driver to gain access to Ring-0 capabilities. https://t.co/sAnlLn9rXS
0
47
193