@r0ns3n Profile picture

Ronnie Salomonsen bsky @r0ns3n.dk

@r0ns3n

Adversary Methods - Research & Discovery (RAD) Team @Mandiant - Now Part of @GoogleCloud. Former DFIR, Malware & Network Analyst. All tweets are my own.

Similar User
Willi Ballenthin photo

@williballenthin

Mathew photo

@mittypk

Dan Perez photo

@MrDanPerez

The Haag™ photo

@M_haggis

Andreas Sfakianakis / @asfakian@infosec.exchange photo

@asfakian

Greg Lesnewich photo

@greglesnewich

nick photo

@3dRailForensics

Bryce photo

@bryceabdo

Rufus photo

@rufusmbrown

Steve Eckels photo

@stevemk14ebr

Andy Moore photo

@malwaresoup

Joe Desimone photo

@dez_

1aN0rmus photo

@TekDefense

Tyler McLellan photo

@tylabs

⚛️ Marcin Siedlarz photo

@siedlmar

Pinned

Another #CVE-2022-23296 of mine just got published. #Microsoft #Windows Installer contains a local privilege escalation #vulnerability. #Mandiant #MYOW #UpdateNow #MandiantVulnerabilityDisclosure github.com/mandiant/Vulne…


Ronnie Salomonsen bsky @r0ns3n.dk Reposted

#SaveTheDate 🚨🚨🚨#PIVOTcon25 is coming: 7-9 May 2025 👀👀👀 Book your calendars to sit with us on the #yellowsofa and listen to the top threat intelligence research and analytical pivots 💪 #CTI #ThreatIntel New venue ⬇️ 🇪🇸 🏖️ 1/3

Tweet Image 1

Ronnie Salomonsen bsky @r0ns3n.dk Reposted

🚨 Check out the new #BehindTheBinary Podcast hosted by @jstrosch !🎙️ Dive into the stories of those unraveling technology's complexities. Listen to the first episode with @nickharbour, a #ReverseEngineer on the Mandiant FLARE team. 🎧 open.spotify.com/show/3yWgmIuhW…


Ronnie Salomonsen bsky @r0ns3n.dk Reposted

A Happy Halloween from the MITRE ATT&CK team with a special treat: ATT&CK v16.0, including new spooky behaviors and ghoulish groups, as well as revisions and contributions, to satisfy your every #infosec need! Check out @supremrobertson’s release blog at medium.com/mitre-attack/a…


Ronnie Salomonsen bsky @r0ns3n.dk Reposted

I'll be talking about the EDR project in this week's "Atomics on a Friday" and possibly show how to collect the telemetry for evaluation using Atomics. I'll also be answering any questions live and sharing future roadmaps. Hope to see you there! 🙂🎃

🎃 Get ready for a spooky special! This Friday on Atomics on a Friday, we're diving into chilling cyber attacks, eerie atomic red team simulations, and more! 👻 Special guests will be joining us for some Halloween thrills. Don’t miss it! 🎃 youtube.com/live/VGFT83MLR…

Tweet Image 1


Ronnie Salomonsen bsky @r0ns3n.dk Reposted

Static reports and delayed updates leave security teams struggling against fast-paced #cyberattacks. 👉 Tomorrow, join our experts to discover how dynamic #threatintelligence can help you stay ahead. Don’t miss your last chance to register! → bit.ly/48gOIPM

Tweet Image 1

Ronnie Salomonsen bsky @r0ns3n.dk Reposted

🚨 Breaking: A zero-day vulnerability (CVE-2024-47575) has been observed impacting Fortinet FortiManager devices, posing serious risks. Learn how the exploit works, and how to defend against the threat. Read more -> bit.ly/4hbqmuR #ThreatIntelligence

Tweet Image 1

Ronnie Salomonsen bsky @r0ns3n.dk Reposted

YARA-X 0.10.0 has been released. github.com/VirusTotal/yar…


Ronnie Salomonsen bsky @r0ns3n.dk Reposted

YARA-X 0.9.0 has been released. github.com/VirusTotal/yar…


Ronnie Salomonsen bsky @r0ns3n.dk Reposted

Great technical post on LummaC2 obfuscation and how to deobfuscate samples through symbolic backward slicing: cloud.google.com/blog/topics/th… 🫸🫷 @cPeterr and Nino!


Ronnie Salomonsen bsky @r0ns3n.dk Reposted

#flareon11 game board is now open for early registration. Go claim your username. See you in two days! flare-on11.ctfd.io


Ronnie Salomonsen bsky @r0ns3n.dk Reposted

Unicorn Engine (CPU emulator) v2.1.0 released with lots of goodies. I’m particularly interested in the memory snapshots/CoW support, to enable approximate emulation of all code paths, like we do in FLOSS. github.com/unicorn-engine… #reverseengineering #emulation


Ronnie Salomonsen bsky @r0ns3n.dk Reposted

We've just released #flare capa v7.3.0 github.com/mandiant/capa/… Three major enhancements: 1. Support for VMRay sandbox analysis archives 2. Support for BinExport files generated by Ghidra 3. Introducing the capa rules website Plus several smaller fixes/updates and six new rules.


Ronnie Salomonsen bsky @r0ns3n.dk Reposted

capa v7.3 out! Recently we’ve added: - Drakvuf and @vmray sandbox support - web interfaces for results, rules, and homepage - BinExport2 backend that enables aarch64 and Android analysis via Ghidra - …and of course lots of new rules github.com/mandiant/capa/…


Ronnie Salomonsen bsky @r0ns3n.dk Reposted

Check out the capa Explorer web application for browsing capa results: mandiant.github.io/capa/explorer/


Ronnie Salomonsen bsky @r0ns3n.dk Reposted

🚨 Mandiant has identified a North Korea nexus cyber espionage group, #UNC2970, targeting energy & aerospace with job recruiter lures. Access the full details → bit.ly/3MQzuXU

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.