@adrian__luca Profile picture

Adrian Luca (infosec.exchange/@adrian_luca)

@adrian__luca

Security Test & Threat intelligence Engineer @virusbtn

Similar User
Arkbird photo

@Arkbird_SOLG

Shadow Chaser Group photo

@ShadowChasing1

Yogesh Londhe photo

@suyog41

DOCGuard - Detect Maldocs in Seconds! photo

@doc_guard

sysopfb photo

@sysopfb

Dee photo

@ViriBack

nao_sec photo

@nao_sec

Matthew Mesa photo

@mesa_matt

proxylife photo

@pr0xylife

Zscaler ThreatLabz photo

@Threatlabz

Artilllerie ☣ photo

@Artilllerie

J.A.R.V.I.S photo

@peppermalware

avman photo

@avman1995

neonprimetime photo

@neonprimetime

3xp0rt photo

@3xp0rtblog

Adrian Luca (infosec.exchange/@adrian_luca) Reposted

🆒 New Blog! Cyber Threat Intelligence for Autodidacts 🔗 blog.bushidotoken.net/2024/10/cyber-…

Tweet Image 1
Tweet Image 2

Adrian Luca (infosec.exchange/@adrian_luca) Reposted

This is a mind map of different pivoting methods for #APT tracking that I presented at the Virus Bulletin conference, and people really liked it, so I thought I’d share it here too for anyone who wants to use it as a base for tracking cyber threat actors.

Tweet Image 1

Adrian Luca (infosec.exchange/@adrian_luca) Reposted

New joint TAG/Mandiant research on a hybrid Russian espionage/influence campaign (UNC5812) targeting potential Ukrainian military recruits with malware and spreading anti-mobilization narratives cloud.google.com/blog/topics/th…


Adrian Luca (infosec.exchange/@adrian_luca) Reposted

New blog post! In-depth investigation into an unknown APT group called #IcePeony 😎 nao-sec.org/2024/10/IcePeo…

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

Adrian Luca (infosec.exchange/@adrian_luca) Reposted

Just saw someone have a GPO that uses local FW to block internet access from the following: wscript.exe mshta.exe cscript.exe conhost.exe runScriptHelper.exe Nice idea!


Adrian Luca (infosec.exchange/@adrian_luca) Reposted

🇪🇺Amid the upcoming EU membership referendum, Moldova is being hit with #disinformation emails aimed at discrediting the pro-EU course and its supporters. 🕵️Read more about hybrid disinformation-malware operations across Europe by the #LyingPigeon group: research.checkpoint.com/2024/disinform…

Tweet Image 1
Tweet Image 2

Adrian Luca (infosec.exchange/@adrian_luca) Reposted

Check Point researchers look into Operation MiddleFloor, an ongoing disinformation campaign against Moldova’s government & education sectors acting ahead of Moldova’s elections to foster negative perceptions of European values & the EU membership process. research.checkpoint.com/2024/disinform…

Tweet Image 1

Adrian Luca (infosec.exchange/@adrian_luca) Reposted

Thank you once again to everyone who came to #vb2024 and made it a great success: speakers, delegates, partners, chairpersons, poster presenters, A/V team, VB crew, students from National College of Ireland, & photographer Tim Berghoff. See you at VB2025 in Berlin (24-26 Sept)!!

Tweet Image 1

Adrian Luca (infosec.exchange/@adrian_luca) Reposted

The winner of the 2024 Péter Szőr Award for the best technical security research is #ESETresearch and @marc_etienne_ for "Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain". More: welivesecurity.com/en/eset-resear… #VB2024

Tweet Image 1

Adrian Luca (infosec.exchange/@adrian_luca) Reposted

My first @virusbtn conference and so glad to see more focus on protecting high-risk communities! Very interesting to hear @martijn_grooten talk about threat intel for these communities too.

Tweet Image 1

Adrian Luca (infosec.exchange/@adrian_luca) Reposted

By analyzing thousands of samples, #ESETresearch has conducted a comprehensive technical analysis of the toolset the 🇷🇺Russia-aligned #Gamaredon #APTgroup used in 2022 and 2023 to spy on Ukraine🇺🇦 . welivesecurity.com/en/eset-resear… 1/9


Adrian Luca (infosec.exchange/@adrian_luca) Reposted

弊社SOCアナリストの澤部、林、小池が、2024/10/2~4に開催されるVB2024 Dublinにて、弊社の独自リサーチ成果を「P-wave of malicious code signing」というタイトルで発表します。 発表模様は後日ブログで紹介する予定ですので、ご期待ください。 virusbulletin.com/conference/vb2… #VB2024 #MSIX


Adrian Luca (infosec.exchange/@adrian_luca) Reposted

After five years, nao_sec is returning to VB! kkrnt and PINKSAWTOOTH will be presenting on an unknown APT group at #VB2024. See you in Dublin 🇮🇪 virusbulletin.com/conference/vb2…


Adrian Luca (infosec.exchange/@adrian_luca) Reposted

The programme for #VB2024 is now complete, with 14 new papers added to the programme. Check out the additions and register at virusbulletin.com/conference/vb2…

Tweet Image 1

Adrian Luca (infosec.exchange/@adrian_luca) Reposted

New blog article: Sandbox scores are not an antivirus replacement #GDATATechblog @GDATA gdatasoftware.com/blog/2024/09/3…


Adrian Luca (infosec.exchange/@adrian_luca) Reposted

My @virusbtn keynote next month is titled “Solving puzzles: protecting high-risk communities.” Here’s what I’ll talk about. I don’t think there’s a live stream, but it will be recorded and available on YouTube later.

Tweet Image 1

Adrian Luca (infosec.exchange/@adrian_luca) Reposted

We're excited to announce that #VB2024 opening & closing keynotes will be delivered by @runasand and @BrianHonan, repectively. VB2024 takes place in Dublin 2-4 Oct - there's still time to register, submit a last-minute paper (CFP closes 2 Sept) or poster! virusbulletin.com/conference/vb2…

Tweet Image 1

Adrian Luca (infosec.exchange/@adrian_luca) Reposted

I am delighted to be this years closing keynote speaker for the @virusbtn 2024 conference in Dublin #VB2024

The #VB2024 programme features >70 international security experts. Register now to join us and fellow IT security professionals from around the world - or submit a last-minute paper proposal for a chance to be the one on stage sharing your research! virusbulletin.com/conference/vb2…

Tweet Image 1


Adrian Luca (infosec.exchange/@adrian_luca) Reposted

The VB2024 call for last-minute papers - presenting 'hot' research and material that is truly up-to-the-minute - is now open. To share your research with security experts around the globe submit your proposal now! virusbulletin.com/conference/vb2…

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.