🇺🇦 Xorhex 🇺🇦
@xorhex.bsky.social
230 followers 570 following 80 posts
Posts Media Videos Starter Packs
Reposted by 🇺🇦 Xorhex 🇺🇦
bbaskin.bsky.social
The Binary Ninja 5.2 dev release is showing some amazing work with their new Time Travel Debugging (TTD) interface. This makes a huge impact on analysis!

(and fits well on my UW monitor)
xorhex.bsky.social
When walking a zip file's central directory structure using #yara-x, `math.max` and `with` are your friends.
xorhex.bsky.social
Time to update: cargo install-update -i yara-x-cli
wxs.bsky.social
Two things:

YARA-X 1.8.0 is out with some nice features if you use the various bindings and a bug fix involving an edge case in PE signatures. Congrats to all involved!

To be more useful I wrote a small PR to display filenames in console.log() output when using yr scan.

github.com/VirusTotal/y...
Release v1.8.0 · VirusTotal/yara-x
Implement block scanning API for Rust and C (#459, 185c2ee). Implement Golang and C APIs for setting global variables of type array and structure (#449). Add iterator for Rules object in Python (#4...
github.com
xorhex.bsky.social
Yet again, you're providing god tier support on this open source project. Thank you! 🙇
Reposted by 🇺🇦 Xorhex 🇺🇦
Reposted by 🇺🇦 Xorhex 🇺🇦
strikereadylabs.com
Quite a bit of CN APT activity in europe in the past week

strikeready.com/blog/cn-apt-...

As always, if you're interested in tuning your skills, download the samples here github.com/StrikeReady-...
CN APT targets Serbian Government
Mustang Panda continues targeting European governments
strikeready.com
Reposted by 🇺🇦 Xorhex 🇺🇦
cyberoverdrive.bsky.social
A thread of great questions from @greg-l.bsky.social and fantastic answers (and nuance) by @invisig0th.bsky.social, about the legendary APT1 report and way more.
greg-l.bsky.social
HI @invisig0th.bsky.social been enjoying your recent media appearances with KZ and TBP!

Was wondering two things

1. You’re obviously the lead singer of the APT1 report “band” - Without burning names, can you talk about the make up of the team (skills, backgrounds, etc) +
& what made it special?
Reposted by 🇺🇦 Xorhex 🇺🇦
pivotcon.bsky.social
📣 🔥 🛋️ SAVE THE DATE 🛋️ 🔥 📣
The next #PIVOTcon will be on 6-8 May 2026, in Malaga, ES!!!

You favorite ;) #ThreatResearch conference is coming back and we are planning to bring you the usual experience and content of utmost quality. Follow us + #StayTuned for more info
#CTI #ThreatIntel #PIVOTcon26
xorhex.bsky.social
Thanks!! That means a lot. Hoping to drop an update with another feature one of these days. So many ideas and not enough time 😅
xorhex.bsky.social
Doesn’t look like they are on bsky.
xorhex.bsky.social
Know if it’s Yara or Yara-X? When I quickly went through the blog, I got the feeling it was Yara.
Reposted by 🇺🇦 Xorhex 🇺🇦
xorhex.bsky.social
Why is it so hard to get software over the last mile stone to make it usable for more than just me? I've a new #BinaryNinja ( #yarax ) plugin sitting in the wings needing to be polished for release and another release of #BinjaExtras with additional features close, but not close enough for release.
Reposted by 🇺🇦 Xorhex 🇺🇦
esetresearch.bsky.social
#ESETresearch has observed #Gamaredon exploiting CVE-2025-8088 (#WinRAR path traversal) in an ongoing spearphishing campaign. This vulnerability allows arbitrary file write via crafted RAR archives. 1/6
Reposted by 🇺🇦 Xorhex 🇺🇦
Reposted by 🇺🇦 Xorhex 🇺🇦
oxley.io
This morning, Amazon Cyber Threat Intelligence published a report about a recent watering hole attack by APT29 🇷🇺 that we discovered targeting Microsoft device code authentication. Proud of the work of the team and the chance to share this with the community! aws.amazon.com/blogs/securi...
Amazon disrupts watering hole campaign by Russia’s APT29 | Amazon Web Services
Amazon’s threat intelligence team has identified and disrupted a watering hole campaign conducted by APT29 (also known as Midnight Blizzard), a threat actor associated with Russia’s Foreign Intelligen...
aws.amazon.com
Reposted by 🇺🇦 Xorhex 🇺🇦
julianferdinand.bsky.social
I'm excited to speak at #VB2025 later this week! I'll be diving into TAG-124, a group whose services are leveraged by a wide range of actors, from cybercriminals to state-sponsored groups. Hit me up if you are in town!

www.virusbulletin.com/conference/v...
Reposted by 🇺🇦 Xorhex 🇺🇦
julianferdinand.bsky.social
Really excited to present at #LABScon25 on ChamelGang‘s most recent campaign targeting the Taliban, a collaborative research project with @milenkowski.bsky.social (SentinelLABS) and @azaka.fun (TeamT5)! www.labscon.io/speakers/jul...
Reposted by 🇺🇦 Xorhex 🇺🇦
re-verse.io
RE//verse 2026 CFP is open! Want to be apart of the lineup? Submit your talk: sessionize.com/reverse-2026