
__mat__
@matthieu_faou
Followers
2K
Following
953
Media
24
Statuses
810
Malware researcher at @ESETResearch @[email protected]
Joined March 2016
RT @ESETresearch: #ESETresearch discovered and reported to @certcc a vulnerability that allows bypassing UEFI Secure Boot on most UEFI-base….
welivesecurity.com
ESET researchers have discovered a vulnerability that affects the majority of UEFI-based systems and allows bypassing UEFI Secure Boot.
0
82
0
RT @ESETresearch: #ESETResearch is hiring a senior malware researcher for our 🇨🇦office. If you’d like to track some of the most impactful A….
0
19
0
RT @MsftSecIntel: Based on our findings and those reported by governments and other security vendors, Microsoft Threat Intelligence assesse….
0
128
0
RT @ESETresearch: #ESETresearch reveals the first Linux UEFI bootkit, Bootkitty. It disables kernel signature verification and preloads two….
welivesecurity.com
ESET's discovery of the first UEFI bootkit designed for Linux sendss an important message: UEFI bootkits are no longer confined to Windows systems alone.
0
166
0
RT @ESETresearch: #ESETresearch discovered an #exploit targeting Firefox and Windows zero days, used in the wild by Russia-aligned #RomCom.….
0
80
0
RT @ESETresearch: #ESET research has identified #Linux malware samples, one of which we named #WolfsBane and attribute with high confiden….
welivesecurity.com
ESET researchers analyzed previously unknown Linux backdoors that are connected to known Windows malware used by the China-aligned Gelsemium group, as well as to Project Wood.
0
56
0
RT @Volexity: .@Volexity has published a blog post detailing variants of LIGHTSPY & DEEPDATA malware discovered in the summer of 2024, incl….
volexity.com
In July 2024, Volexity identified exploitation of a zero-day credential disclosure vulnerability in Fortinet’s Windows VPN client that allowed credentials to be stolen from the memory of the client’s...
0
50
0
RT @ESETresearch: After #OperationMagnus, the takedown of #RedLine Stealer and #META Stealer, #ESETresearch is publicly releasing our and F….
0
33
0
RT @ESETresearch: #ESETresearch analyzed CloudScout, a previously undocumented toolset used by Evasive Panda against a government entity an….
welivesecurity.com
ESET researchers discover a previously undocumented toolset used by Evasive Panda to access and retrieve data from cloud services.
0
29
0
RT @ESETresearch: #ESETresearch analyzed new Rust-based tools, MDeployer and MS4Killer, used for deploying #Embargo ransomware and discover….
welivesecurity.com
ESET researchers uncover new Rust-based tools that we named MDeployer and MS4Killer and that are actively utilized by a new ransomware group called Embargo.
0
37
0
RT @ESETresearch: #ESETresearch investigated two previously undocumented toolsets used by the #GoldenJackal APT group, both of which targe….
welivesecurity.com
ESET Research analyzed two separate toolsets for breaching air-gapped systems, used by a cyberespionage threat actor known as GoldenJackal.
0
48
0
RT @ESETresearch: The winner of the 2024 Péter Szőr Award for the best technical security research is #ESETresearch and @marc_etienne_ for….
0
25
0
RT @sekoia_io: Since mid-2023, the Sekoia #TDR team has investigated an infrastructure which controls compromised edge devices transformed….
0
22
0
RT @ESETresearch: #ESETresearch has discovered a new China-aligned APT group, which we named #CeranaKeeper, conducting massive data exfiltr….
0
85
0
RT @ESETresearch: By analyzing thousands of samples, #ESETresearch has conducted a comprehensive technical analysis of the toolset the 🇷🇺Ru….
welivesecurity.com
ESET Research has conducted a comprehensive technical analysis of Gamaredon’s toolset used to conduct its cyberespionage activities focused in Ukraine.
0
50
0
RT @ESETresearch: #ESETresearch dives into #CosmicBeetle’s activities over the last year, including its shift to custom ransomware deployme….
welivesecurity.com
ESET researchers examine the recent activities of the CosmicBeetle threat actor, documentingt its new ScRansom ransomware and highlighting connections to other well-established ransomware gangs.
0
17
0
RT @ESETresearch: #ESETresearch has analyzed a single-click exploit for WPS Office for Windows being used in the wild by threat actor #APT-….
0
77
0
RT @matthieu_faou: We are looking for a strategic threat intel analyst to join @ESETresearch. Interested in cyber-espionage and geopolitics….
linkedin.com
Today’s top 1,000+ Intelligence Officer jobs in United States. Leverage your professional network, and get hired. New Intelligence Officer jobs added daily.
0
42
0
RT @Volexity: .@Volexity shares #threatintel on how #StormBamboo compromised an ISP to conduct DNS poisoning attacks on targeted organizati….
volexity.com
In mid-2023, Volexity detected and responded to multiple incidents involving systems becoming infected with malware linked to StormBamboo (aka Evasive Panda, and previously tracked by Volexity under...
0
68
0
We are looking for a strategic threat intel analyst to join @ESETresearch. Interested in cyber-espionage and geopolitics? Apply!.
linkedin.com
Today’s top 1,000+ Intelligence Officer jobs in United States. Leverage your professional network, and get hired. New Intelligence Officer jobs added daily.
3
42
67