FAMASoon

4.2K posts

FAMASoon

FAMASoon

@FAMASoon

Security research blog: https://t.co/iTsZ04qDQ8 GitHub: https://t.co/nfFPKkjf5O

Tokyo-to, Japan 加入时间 Nisan 2016
781 关注928 粉丝
FAMASoon 已转推
エヌ・エフ・ラボラトリーズ
【サイトリニューアルのお知らせ】 このたび、コーポレートサイトをリニューアルいたしました。今後も内容の充実を図り、分かりやすい情報発信に努めてまいります。 nflabs.jp
日本語
0
1
2
235
Aaron Jornet
Aaron Jornet@RexorVc0·
@FAMASoon Thanks mate!!, yep, it’ll be available on Kindle in the future 🙇
English
1
0
1
62
FAMASoon 已转推
Aaron Jornet
Aaron Jornet@RexorVc0·
🚨 Big news: New TH Book 🏹 After years in Threat Hunting, I wrote the book I always wanted when I started. The Art of Threat Hunting, practical, technical, no fluff. ⚡Hypothesis generation, queries & adaptation stuff, CTI-driven programs, documentation, team alignment. The full lifecycle. 🦖Full breakdown on the blog: rexorvc0.com 🔗Available on Amazon: amazon.com/Art-Threat-Hun… #ThreatHunting #BlueTeam #Cybersecurity #Research #CTI #Malware #threat
Aaron Jornet tweet media
English
11
70
318
16.5K
FAMASoon 已转推
ATT&CK
ATT&CK@MITREattack·
ATT&CK v19 is coming 4/28! The biggest change this release is the replacement of the Defense Evasion tactic in Enterprise ATT&CK with new Stealth and Impair Defenses tactic. @coolestcatiknow talked more about what's changing back at ATT&CKcon 6.0 youtube.com/watch?v=0rQQhS….
YouTube video
YouTube
ATT&CK tweet media
English
3
32
104
7.3K
FAMASoon 已转推
Tony/Humpty
Tony/Humpty@cyb3rjerry·
Axios payload hashes: Windows Stage 1 f7d335205b8d7b20208fb3ef93ee6dc817905dc3ae0c10a0b164f4e7d07121cd Windows Stage 2 617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101 macOS 92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a Linux fcb81618bb15edfedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf
Français
7
80
580
67.7K
FAMASoon 已转推
Zellic
Zellic@zellic_io·
For a deeper look into this zero-day vulnerability, including the full root-cause analysis, proof of concept, exploitation, and patch analysis, check out our newly published blog post: zellic.io/blog/pwning-v8…
English
0
59
209
10.2K
FAMASoon 已转推
Zellic
Zellic@zellic_io·
How to find a $65,000 zero-day in Chrome V8: Meet @eternalsakura13, researcher at Zellic. - Top 3 Chrome VRP 2022–2024 - Top 2 Facebook whitehat in 2023 - Top 10 MSRC MVR in 2025 Here’s a walk through the mind of one of the world’s best Chrome researchers. Can you follow along?
Zellic tweet media
English
4
57
511
46.7K
FAMASoon 已转推
Grzegorz Tworek
Grzegorz Tworek@0gtweet·
Sad days for "killing with a driver" enthusiasts. Hurry up - it will be useless in a couple of days. x.com/0gtweet/status…
Jiří Vinopal@vinopaljiri

#Microsoft is finally pulling the plug on cross-signed driver trust 🔒 Starting April 2026 (Win11 24H2/25H2/26H1 + Server 2025), the kernel will only load WHCP-certified drivers by default. Cross-signed certs were deprecated back in 2021 — but trust persisted until now. Key points: 🔹 Only WHCP-signed drivers trusted by default 🔹 Small allow-list for widely-used reputable cross-signed drivers 🔹 Rolls out in evaluation mode first (100h uptime + 3 reboots before enforcement kicks in) 🔹 Confidential/internal drivers can still run via App Control (WDAC) policy anchored to UEFI Secure Boot PK/KEK 🛡️ BYOVD impact — this is a big deal The majority of classic #BYOVD drivers used to kill #EDRs (e.g., gdrv.sys, rtcore64.sys, DBUtil_2_3.sys…) are cross-signed. If their signatures are now untrusted by default, weaponizing them gets significantly harder. Combined with the vulnerable driver blocklist, the attack surface shrinks meaningfully. Not a silver bullet — WHCP-signed drivers can still be vulnerable — but closing the cross-signed weapons cache that threat actors have been raiding for years is a real, concrete win. Should've happened in 2021 when the certs actually expired, but better late than never. 🫠 📄 Blog: techcommunity.microsoft.com/blog/windows-i… 📄 Cert deprecation: learn.microsoft.com/en-us/windows-… #ReverseEngineering #BYOVD #EDR #MalwareAnalysis #WindowsSecurity

English
0
10
32
8.9K
FAMASoon 已转推
Haifei Li
Haifei Li@HaifeiLi·
Recently I accidentally encountered a memory OOB-read bug in Microsoft Word, this bug is particularly interesting because the root cause is so straightforward.. and I spent some time debugging it and successfully developed a working exploit (info-leak). Not very often I got to make working exploits for my bugs but this one was a fun experience. All reported to MSRC, stay tuned for details. :)
English
3
5
84
7.2K
FAMASoon 已转推
Hack The Box
Hack The Box@hackthebox_eu·
Something BIG joins HTB Academy on April 2nd 😱 We are launching our most anticipated AI certification yet as part of the Silver Annual subscription. The name is currently [Redacted].  What do you think the name of the AI red teaming certification will be? Take a guess in the comments below 👇  #HackTheBox #HTB #Cybersecurity #AI #AIRedTeaming #InformationSecurity
Hack The Box tweet media
English
25
52
387
37.3K
FAMASoon 已转推
SpecterOps
SpecterOps@SpecterOps·
Stop asking LLMs to “find vulns.” Start using them to understand code. @Sw4mp_f0x walks through using Claude Code as a force multiplier in app assessments - faster analysis, fewer false positives, better outcomes. Check it out: ghst.ly/4rA3uJd
English
4
167
827
49.1K