I tweet about my learning in Malware analysis, Threat Intel, Detection engineer and DFIR journey.
Opinions are mine only!securityinbits.com SingaporeJoined September 2015
Just got my Sigma → Markdown (KQL & Elastic) converter working
vibe-coded using Codex CLI
- Converts into Markdown (KQL & Lucene) using sigma backends.
- Saves them into your Obsidian - easy to search & link.
If anyone’s interested, drop me a comment or DM. I might publish…
New malware analysis blog on #DarkCloud, an infostealer written in VB6 + a config extractor and string decryption tool for IDA Pro!
esentire.com/blog/eye-of-th…
Seeing AdaptixC2 pop up in real breaches now
🔍Hunting tips for AdaptixC2:
• Look for default user-agent
• Use YARA rules + config extractor from @Unit42_Intel
• Leverage C2 & hash feeds: ThreatFox, MalwareBazaar, @drb_ra
Here’s how defenders can spot it fast 👇
Attackers are still dumping LSASS - comsvcs.dll is showing up in real breaches.
What's Inside:
✅ Exact cmd
✅Visual Sigma mapping
✅ Microsoft (Kusto) + Splunk queries
Thanks to @cyb3rops, @nas_bench & @_swachchhanda_ for the Sigma rules
👇 Full blog link in reply
LSASS dump via comsvcs.dll is still in play.
Recently seen in a ransomware cases
Rundll32 calling MiniDump from comsvcs is a big red flag.
I tested this in the lab. These 3 Sigma rules fired without fail 👇
Blog with full command and sigma rule links dropping soon..
Ever wonder if a malicious process has injected .NET assemblies?
Here’s a 2-sec check using System Informer👇
1️⃣Open Process Properties
2️⃣Go to .NET assemblies
3️⃣Options -> Hide native
You'll now see the suspicious injected .NET assembly
Dump with pe-sieve for triage.
4K Followers 2K FollowingFounder & CEO, ApoGlide Group | Host, CONTINENT DNA
Builder of systems that turn ambition into execution
I write about leadership, precision, and progress
10K Followers 470 FollowingThreat Researcher at Check Point @_CPResearch_ #DFIR #Reversing - All opinions expressed here are mine only.
https://t.co/iWvwWF1AnN
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
138K Followers 45K FollowingEx @Streamlit @Snowflake Maestro 🪄 • X about AI agents, LLMs, web apps, Python & SEO • My ❤️ is open source • DM for collabs 📩
699 Followers 1K Following🇮🇹 | IT Engineer with Cyber Security passion | Malware Analysis | Reverse Engineering | CTI
- views and opinions are solely my own -
4.4M Followers 3 FollowingOpenAI’s mission is to ensure that artificial general intelligence benefits all of humanity. We’re hiring: https://t.co/dJGr6Lg202
229K Followers 683 FollowingOn a mission to become a better writer, thinker, and entrepreneur • Ex-dentist, now building an internet business (at ~$500k/year).
9K Followers 225 Followingai/ml engineer. youngest to get a phd in biostats from ucsd. spent the last 6 years building AI systems for startups, mid-sized companies & global enterprises
1.4M Followers 1K FollowingBuilding @EurekaLabsAI. Previously Director of AI @ Tesla, founding team @ OpenAI, CS231n/PhD @ Stanford. I like to train large deep neural nets.
210K Followers 360 FollowingI build & teach AI stuff. Founder @TakeoffAI where we’re building an AI coding tutor. Come learn to code + build with AI at https://t.co/oJ8PNoAutE.
2K Followers 68 FollowingPwned Labs delivers fun and immersive cybersecurity training experiences for individuals and businesses. Join the community: https://t.co/kyG413GZDa
9K Followers 855 FollowingBad guy chaser, writer/author, espionage & ransomware SME. Sometimes I harass my dog. He is the brains behind these projects and opinions are his.
325K Followers 119 FollowingEmpowering the world to fight cyber threats with indispensable cybersecurity skills and resources. Build the path to a secure future with OffSec.
26K Followers 1K FollowingI play with vulnerabilities and exploits. I used to be here on Twitter but now I'm here:
@[email protected]
https://t.co/hXggdAVkSQ