Blackstorm Security
@blackstormsecbrBlackstorm Security is a highly specialized company on exploit development, reverse engineering, malware analysis and threat hunting.
Similar User
@ale_sp_brazil
@OtterHacker
@reverseame
@re_and_more
@pr0xylife
@seal9055
@DirectoryRanger
@VirtualAllocEx
@blackorbird
@0xdea
@_CPResearch_
@ForensicITGuy
@_ringzer0
@silascutler
@BushidoToken
ETW Forensics - Why use Event Tracing for Windows over EventLog? - blogs.jpcert.or.jp/en/2024/11/etw… #DFIR
Decoding Anti-Virus Detection Names For Malware Analysts: digitalinvestigator.blogspot.com/2024/11/decodi… #malwareanalysis #infosec #informationsecurity #dfir #reverseengineering #malware #cybersecurity
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging: securonix.com/blog/crontrap-… #malware #emulation #cybersecurity #malwareanalysis #linux #threathunting #informationsecurity #dfir
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign: blogs.blackberry.com/en/2024/11/lig… #cyberattack #threathunting #informationsecurity #hacking #redteam #dfir #malwareanalaysis #malware #reversing #reverseengineering
(PT_BR) O treinamento de "Fuzzing for Vulnerability Research" está com as inscrições abertas! A data agendada do início deste treinamento é: 18/JANEIRO/2025. Informações adicionais podem ser obtidas no website da Blackstorm Security. #fuzzing #vulnerability #exploit
Decider (from CISA GOV): "Decider is a tool to help analysts map adversary behavior to the MITRE ATT&CK Framework. Decider makes creating ATT&CK mappings easier to get right by walking users through the mapping process. github.com/cisagov/decider #cybersecurity #blueteam
(PT_BR) O treinamento de Windows Exploit Development 2 está está agendado para 05/ABRIL/2025, e tem duração de 40 horas. Informações adicionais podem ser obtidas no website da Blackstorm Security. #exploitation #exploit #assembly #reversing #vulnerability
Breaking into Libraries – DLL Hijacking: labs.jumpsec.com/breaking-into-… #cybersecurity #dllhijacking #infosec #informationsecurity #malware #redteam
Evasion Trends in Phishing Campaigns: inde.nz/blog/evasion-t… #cybersecurity #informationsecurity #phishing #threatintelligence #malware
(PT_BR) O treinamento de NETWORK THREAT ANALYSIS está com a próxima turma agendada para 16 e 17 de NOVEMBRO/2024. Informações adicionais podem ser obtidas no website da Blackstorm Security. #dfir #incidentresponse #informationsecurity #malware #cybersecurity #threathunting
(PT_BR) O treinamento de MALICIOUS DOCUMENT ANALYSIS está com a próxima turma CONFIRMADA para início em 04/JANEIRO/2025. Informações adicionais podem ser obtidas no website da Blackstorm Security. #malware #maldoc #cybersecurity
The State of Profiling: opentelemetry.io/blog/2024/stat… #performance #cybersecurity #informationsecurity
Protecting your devices from information theft: elastic.co/security-labs/… #informationsecurity #cybersecurity #keylogger #threathunting #infosec #dfir #cyberprotection #cyberdefense
Defender for Endpoint: Bypassing Lsass Dump with PowerShell cyberdom.blog/defender-for-e… #windows #redteam #password #hashes #hacking #threathunting #powershell
TA Phone Home: EDR Evasion Testing Reveals Extortion Actor's Toolkit: unit42.paloaltonetworks.com/edr-bypass-ext… #edr #malware #cybersecurity #informationsecurity #threathunting #threatanalysis
Ghostscript wrap-up: overflowing buffers: codeanlabs.com/blog/research/… #cybersecurity #exploitation #exploit #informationsecurity #vulnerability
CFPsec version 1.3, which a simple script to check for upcoming conferences and CFP, is available: github.com/alexandreborge… To install it, run: python3 -m pip install -U cfpsec To use it: $ cfpsec.py">cfpsec.py $ cfpsec.py">cfpsec.py -u 1 #cybersecurity #infosec
EDR Telemetry Project: edr-telemetry.com/index.html #edr #infosec #informationsecurity #cybersecurity #blueteam
Ransomware Landscape in H1 2024: Statistics and Key Issues: medium.com/s2wblog/ransom… #ransomware #malware #cybersecurity #threathunting #incidentresponse #threatinformation #threatintelligence
Chrome’s App-Bound Encryption Cracked: Open-Source Tool Bypasses Security Measure: securityonline.info/chromes-app-bo… github.com/xaitax/Chrome-… #chrome #cryto #infosec #informationsecurity #cybersecurity #exploitation
United States Trends
- 1. Ravens 52,5 B posts
- 2. Justin Tucker 16,1 B posts
- 3. Packers 37,1 B posts
- 4. Steelers 59 B posts
- 5. Lions 63,1 B posts
- 6. Russ 12,2 B posts
- 7. Bears 75,2 B posts
- 8. Jets 42,2 B posts
- 9. #OnePride 11 B posts
- 10. Browns 23,6 B posts
- 11. Jordan Love 5.714 posts
- 12. Dustin Hopkins 1.756 posts
- 13. #HereWeGo 9.037 posts
- 14. Vikings 27,8 B posts
- 15. WWIII 16,8 B posts
- 16. Jags 8.050 posts
- 17. Taysom Hill 3.374 posts
- 18. Boswell 2.897 posts
- 19. #BALvsPIT 4.785 posts
- 20. Drake Maye 7.018 posts
Who to follow
-
Alexandre Borges
@ale_sp_brazil -
OtterHacker
@OtterHacker -
reverseame
@reverseame -
Reverse Engineering and More
@re_and_more -
proxylife
@pr0xylife -
seal
@seal9055 -
DirectoryRanger
@DirectoryRanger -
Daniel F.
@VirtualAllocEx -
blackorbird
@blackorbird -
[email protected]
@0xdea -
Check Point Research
@_CPResearch_ -
Tony Lambert
@ForensicITGuy -
ringzerø.training && @[email protected]
@_ringzer0 -
Silas Cutler (p1nk)
@silascutler -
Will
@BushidoToken
Something went wrong.
Something went wrong.