Brian Baskin
16.2K posts

Brian Baskin
@bbaskin
Threat researcher, malware analysis, RE, incident response, with some old school forensics and CTFing. Apologetic ginger. These are my personal opinions







🚨 Threat actors are now using JavaScript virtual machines to hide phishing payloads inside HTML attachments. Sublime Threat Intelligence and Research (STIR) observed FlowerStorm operators adopting KrakVM just weeks after its release. The campaign included: • VM-based obfuscation • Credential harvesting • Real-time MFA interception A key takeaway: advanced obfuscation is becoming easier to operationalize. Our latest research breaks down the attack chain and what defenders should watch for next. sublime.security/blog/flowersto… #Cybersecurity #Phishing







🚨: Eight Marines outsmarted a DARPA AI meant to spot people. Two somersaulted 300 meters, two snuck under a cardboard box, and one pretended to be a tree—and the AI missed them all, because it was trained to catch people walking.











