APK-47

1K posts

APK-47 banner
APK-47

APK-47

@midnight_comms

#osint #android #DFIR

all up in your DEX Katılım Mayıs 2019
282 Takip Edilen1.1K Takipçiler
APK-47 retweetledi
Moritz
Moritz@m_r_tz·
The FLARE team now freely distributes its quality reverse engineering and malware analysis educational content at github.com/mandiant/flare…. Launched with: - Malware Analysis Crash Course - Go Reversing Reference - Intro to TTD
English
6
389
1.2K
58.7K
APK-47 retweetledi
Austin Larsen
Austin Larsen@AustinLarsen_·
⚠️ Our team at Google is releasing more details on the recent NPM #axios supply chain attack. Notably, we now attribute this activity to #UNC1069, a financially motivated North Korean 🇰🇵 nexus threat actor active since at least 2018.
English
34
193
1.4K
182.2K
APK-47 retweetledi
AprilNEA
AprilNEA@AprilNEA·
🧵 I just reverse-engineered the binaries inside Claude Code's Firecracker MicroVM and found something wild: Anthropic is building their own PaaS platform called "Antspace" (Ants + Space). It's a full deployment pipeline — hidden in plain sight inside the environment-runner binary. Here's what I found 👇
AprilNEA tweet media
English
65
196
1.6K
230.8K
APK-47 retweetledi
Andrew Brown
Andrew Brown@andrewbrown·
Anthropic just announced Claude Certified Architect exam. Aren't you glad I started my Claude certification course last week? I just knew it my bones, that I had to make one, and now I can just align mine to this.
English
39
194
2.3K
310.9K
APK-47 retweetledi
Unit 42
Unit 42@Unit42_Intel·
Iran-linked Handala Hack (aka Void Manticore, COBALT MYSTIQUE) is a reported vector for an increase in wiper attacks. This Insights blog details proactive recommendations for security teams, from identity management to enhancing security controls. bit.ly/4rrBVlu
Unit 42 tweet media
English
1
43
151
21.7K
APK-47
APK-47@midnight_comms·
Has anyone seen any work with APK analysis using AI? Seen a lot of focus on PEs and other binaries - did I miss something someone is working on? If not, I might have to dive into this space whole heartedly #infosec #android
English
0
0
1
74
APK-47 retweetledi
Kostas
Kostas@Kostastsale·
Today I’m launching Threat Hunting Labs. Over the years I’ve analyzed many real-world intrusions. One thing became obvious: most training platforms don’t resemble how investigations actually happen. So I built something different. Threat Hunting Labs focuses on investigation-driven learning using real telemetry and structured investigative paths. If you want to get better at investigating breaches, you should practice investigating breaches. More details here: threathuntinglabs.com/blog/introduci…
English
21
116
586
46.4K
APK-47 retweetledi
Cloudflare Developers
Cloudflare Developers@CloudflareDev·
Introducing the new /crawl endpoint - one API call and an entire site crawled. No scripts. No browser management. Just the content in HTML, Markdown, or JSON.
Cloudflare Developers tweet media
English
771
1.7K
19.9K
10.6M
APK-47
APK-47@midnight_comms·
@HackingLZ Should I use cellebrite, axiom, or encase - nah let me spend countless hours troubleshooting something instead of actually getting to the DFIR part
English
0
0
0
33
APK-47
APK-47@midnight_comms·
@HackingLZ Or, hear me out - just go buy a license for something that is far better than whatever this is, and supported. I’ve never really understood this project - go use something that’s not generally admissible because of how it’s designed??
English
1
0
0
43
APK-47
APK-47@midnight_comms·
Why do we need tools like ATT&CK explorer and stuff anymore? I mean honestly #infosec
English
0
0
0
75
APK-47
APK-47@midnight_comms·
and definitely don't impersonate these named pipes: "cowork-vm-service", "cowork-daemon-console" OR these bins: chrome-native-host.exe, cowork-svc.exe OR this user id: "cowork-vm" -- that would be just awful
English
0
0
0
30
APK-47
APK-47@midnight_comms·
@HackingLZ the next time you're doing an engagement, definitely don't grab these files: C:\Users\Username\AppData\Local\Claude\Logs\*, C:\ProgramData\Claude\Logs\*, C:\Users\Username\AppData\Roaming\Claude\logs\* #ai #infosec
English
1
0
2
68
APK-47 retweetledi
Jamie Levy🦉
Jamie Levy🦉@gleeda·
🧵 We recently had an incident that involved a MuddyWater hands-on attacker who couldn't spell "administrators" Full timeline breakdown below. 1/
Jamie Levy🦉 tweet media
English
14
74
359
55.2K
APK-47 retweetledi
Michael Bargury
Michael Bargury@mbrg0·
we hijacked perplexity comet by sending a weaponized calendar invite then used it to takeover victim's 1p account and exfil their local files call it pleasefix. like clickfix, but instead of social eng'ing a human you just ask their ai real nicely incredible work by @StAJect0r
English
16
58
291
46.9K
APK-47 retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Microsoft Defender researchers observed attackers using yet another evasion approach to the ClickFix technique: Asking targets to run a command that executes a custom DNS lookup and parses the `Name:` response to receive the next-stage payload for execution.
Microsoft Threat Intelligence tweet media
English
21
240
990
165.1K
APK-47
APK-47@midnight_comms·
@HackingLZ This is pretty bold coming from the company who has the most limited AI capabilities of any of the top contenders. Microsoft AI is actually disproving his point
English
0
0
0
22
Justin Elze
Justin Elze@HackingLZ·
Microsoft already has this issue of people disliking them because of Windows being a mess, AI, and other things perhaps better framing around "tasks" vs "jobs" or find a way to make more positive statements. x.com/FT/status/2021…
Financial Times@FT

CEO of Microsoft AI Mustafa Suleyman joins FT editor Roula Khalaf to explain why most of the tasks accountants, lawyers and other professionals currently undertake will be fully automated by AI within the next 12 to 18 months ft.trib.al/SZ4Lti1

English
3
0
15
2.1K