gerardofn Profile Banner
Gerardo Fdez. Profile
Gerardo Fdez.

@gerardofn

Followers
790
Following
10K
Media
42
Statuses
12K

#malware #DFIR #Reversing Security Engineer @ VirusTotal

Benalmádena, Andalucía
Joined June 2009
Don't wanna be here? Send us removal request.
@gerardofn
Gerardo Fdez.
3 months
The new VirusTotal plugin for IDA Pro now integrates Code Insight into your reversing workflow, allowing you to save and use relevant analyses to contextualize other functions. https://t.co/W79Be2Ulxj
0
4
8
@KromicB
KROMIC BRUCK
21 hours
Al final, la única forma de volver a casa era montar en un Renault Outsider. Uno de los mejores anuncios de los últimos años sirvió para rendir tributo a uno de nuestros más queridos recuerdos de infancia y para dar final épico a la legendaria serie animada DUNGEONS & DRAGONS.
35
144
702
@MalGamy12
Gameel Ali 🤘
2 days
New backdoor called #kalim used by #muddywater APT group. multi-threaded C2 tool with AES encryption, file transfer capabilities, and persistent command execution sample: https://t.co/m2AhDyZ2RK sample: https://t.co/s4LpEMBEQo c2: moodleuni[.]com
0
29
100
@struppigel
Karsten Hahn
1 day
Awesome interview and showcase with Tim Blazytko about obfuscation and deobfuscation. https://t.co/HWvIvtbA9a
0
9
45
@5mukx
Smukx.E
3 days
An unexpected journey into Microsoft Defender's signature World https://t.co/17xtrUXk1A
2
67
309
@Mandiant
Mandiant (part of Google Cloud)
2 days
📣 Everything defenders need to know about UNC1549: a deep dive analysis of suspected Iran-nexus espionage targeting the aerospace, aviation, and defense industries in the Middle East. Dive into the details: https://t.co/N2KBeHdJ7z
1
50
112
@raashidbhatt
Raashid Bhat
2 days
Reverse Engineering WASM binaries, trace indirect calls, decode memory layouts https://t.co/f70XDu9cbZ #WASM #ReverseEngineering #SecurityResearch
2
63
281
@NavajaNegra_AB
Navaja Negra Conference
2 days
🎬 ¡Ya está disponible el aftermovie de Navaja Negra 2025! 🔥 Revive los mejores momentos, la energía del evento y todo lo que hizo especial esta edición. Pásate a verlo y comenta qué te pareció. 😎✨ #NN2025 🖤💛 https://t.co/NsUrEUk4Md
0
4
4
@Mandiant
Mandiant (part of Google Cloud)
2 days
🔥 Stop switching tabs. Investigate in place. VT4Browsers is now powered by #GoogleThreatIntelligence! Get real-time threat context and a powerful investigation experience right in your browser. #GoogleTI #GoogleTIMondays #ThreatIntelligence #CyberSecurity
0
12
52
@struppigel
Karsten Hahn
3 days
I am suggesting a new malware type: the browser remote access tool (BRAT) It's a form of browser hijacker that remotely controls your browser based on server commands. Typical form: press key combos for copy-pasting URLs, opening tabs, context menu, downloading files etc
11
25
174
@8kSec
8kSec
3 days
💻Bypass NX on ARM64 and execute your shellcode using mprotect(). Check out the full blog here: https://t.co/3sUJJbmsqB #ARM64 #Reversing #Exploitation
1
39
184
@DirectoryRanger
DirectoryRanger
4 days
Malware development tricks, by @cocomelonckz 46 Windows keylogger https://t.co/9wUR8mBMBj 47 Windows clipboard hijacking https://t.co/LKebjdmDpr 48 leveraging Office macros https://t.co/F1x9odrdbT 49 abusing Azure DevOps REST API for covert data channels
Tweet card summary image
cocomelonc.github.io
1
58
256
@bquintero
Bernardo Quintero
2 days
China: “IA para todos los niños, desde primaria.” Europa y España: “IA, sí… pero antes tres reglamentos, cinco informes, un sandbox y una multa preventiva.” Distintas prioridades, supongo.
4
5
35
@GuidedHacking
GuidedHacking
4 days
🧠 Video Game Packet Encryption 🎩 Learn low-level function hooking to target the specific routines responsible for cryptography, dump the data before it gets encrypted. It's so simple it's stupid. 👉 https://t.co/jGOIZ1HfNL
0
20
122
@GoogleCloudSec
Google Cloud Security
4 days
The Agentic SOC is here. 🛡️Introducing the Alert Triage and Investigation Agent in Google SecOps (Public Preview). It autonomously investigates alerts, runs YARA-L queries, and applies @Mandiant expertise to deliver clear verdicts. See how it works: https://t.co/AOyqnFpYla
12
150
896
@GuidedHacking
GuidedHacking
4 days
👑 How to Fuzz Windows Drivers 💥 Learn the dynamic analysis methodology necessary for actively testing kernel drivers, focusing on fuzzing IOCTL interfaces to uncover security vulnerabilities. 👉 https://t.co/aAztZTPRyl
0
28
171
@Mandiant
Mandiant (part of Google Cloud)
5 days
Attention malware analysts 💻 Our latest blog post delves into Time Travel Debugging (TTD). We introduce the basics of WinDbg and TTD to help you start incorporating TTD into your analysis. 📄: https://t.co/07y5dniRy9
0
70
241
@elasticseclabs
Elastic Security Labs
6 days
#ElasticSecurityLabs uncovers #RONINGLOADER, a multi-stage loader utilizing signed drivers, PPL abuse, CI Policies, and other evasion techniques to deliver #DragonBreath's gh0st RAT variant. Check it out at https://t.co/Df8JLO6w4d
0
57
201
@struppigel
Karsten Hahn
7 days
For anyone who wants to understand certificates better and how to spot abuse, this is a great read (by @SquiblydooBlog ) https://t.co/55pMCg266s
2
28
96