⭐ Announcing a Major Architectural Update to RIFT ⭐

RIFT has undergone a complete rearchitecture to enhance its modularity, extensibility, and usability. An experimental build has been released on our GitHub repository, while the stable build remains available. The experimental build will continue to receive updates and improvements over time.

❓ What is RIFT?

RIFT is a valuable tool for reverse engineers, designed to generate on-demand FLIRT signatures for Rust binaries.

❗ What's new?

⚙️ Three Operation Modes:
- File Analysis Mode: Point RIFT directly at a binary.
- Direct Generation Mode: Target specific crate versions and compiler combinations.
- HTTP API Server Mode: Run RIFT as a service with an async job queue.

🔧 Modernized Ida Pro Plugin: The Ida Plugin has been rebuilt with server integration, enabling FLIRT signature generation while reversing without needing to leave the window.

For more details, visit: https://github.com/microsoft/RIFT

#reverseengineering #malware #rift #infosec #opensource #binaryanalysis

Dive into practical tools for analyzing binary formats with Petr Pucil! Great for reverse engineers, forensics folks, and devs who want to demystify file internals. Clear demos and useful workflows from the NLUUG conference — learn new tricks to inspect, parse, and debug binaries. #ReverseEngineering #BinaryAnalysis #Forensics #Infosec #Tooling #OpenSource #NLUUG #Programming #English
https://video.nluug.nl/videos/watch/e74299a5-f7bd-47fb-9211-11d20bb1b70c
05_Tools_for_analyzing_binary_formats_-_Petr_Pucil

PeerTube

New blogpost: Using radare2 mcp with r2ghidra as security consultant

After playing with OpenCode and its free models (thank you!), I connected them to @radareorg MCP and r2ghidra to perform automated binary analysis with surprisingly results.

I used OpenCode and its free models wired into radare2 MCP + r2ghidra to run assisted reversing with surprisingly good results. Then I wrapped everything in Docker and added a simple Telegram bot with two agents (security analysis + CTF/crackmes).

Post: https://dan1t0.com/2026/01/02/Using-radare2-mcp-with-r2ghidra-as-security-consultant/
Code: https://github.com/dan1t0/r2mcp-bot

Thank you @pancake for the review :P and your love

#ReverseEngineering #CyberSecurity #AI #Automation #Docker #radare2 #Ghidra #BinaryAnalysis #OpenSource

Fourth in the session was Fan et al.'s "R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries," exploring gaps in cryptographic tool evaluation. (https://www.acsac.org/2024/program/final/s223.html) 5/6
#Cybersecurity #BinaryAnalysis

diffalayze — Automated Binary Diffing & LLM Analysis

Tool that auto-diffs binaries, runs side-by-side disassembly, and uses LLMs to rate and explain patch changes.

https://github.com/SySS-Research/diffalayze

#LLM #BinaryAnalysis

GitHub - SySS-Research/diffalayze: LLM-based automated patch diffing

LLM-based automated patch diffing. Contribute to SySS-Research/diffalayze development by creating an account on GitHub.

GitHub

🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!

We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!

🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!

We're thrilled to share this critical Brand Story conversation thanks to our friends at ReversingLabs 🙏

Your Business Apps Are Bringing Friends You Didn't Invite

Every commercial software application is a complex assembly of first-party, contracted, open source, and third-party code. But when #SolarWinds, #Kaseya, and #Ivanti happened, we learned that vendor questionnaires and contractual assurances offer little protection against supply chain compromises.

At #BlackHat2025, Saša Zdjelar, Chief Trust Officer at ReversingLabs, reveals how organizations can finally verify the integrity of #software from outside vendors—without relying on blind trust.

The game-changer: Comprehensive binary analysis that deconstructs any file into its components to:

• Detect malware, tampering, and embedded secrets

• Identify #vulnerabilities and insecure practices

• Uncover undocumented network connections

• Flag #compliance risks from restricted regions

This isn't just another policy checkbox—it's a true technical control that inspects the software itself, regardless of size or complexity.

Real-world applications:

• Procurement: Auto-scan all software before deployment

• Version Monitoring: Detect unexpected behavior changes between releases

• Critical Environments: Verify integrity before software enters OT, ICS, or financial systems

• Risk Management: Assess COTS software as part of ongoing vendor reviews

With regulations like EO 14028 and the EU's #CyberResilience Act demanding transparency, the ability to technically validate every application delivers both strategic protection and measurable benefits.

📺 Watch the video: https://youtu.be/pU9bHYFND7c

🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/your-business-apps-are-bringing-friends-you-didnt-invite-a-brand-story-with-saa-zdjelar-chief-trust-officer-at-reversinglabs-and-operating-partner-at-crosspoint-capital-a-black-hat-usa-2025-conference-on-location-brand-story-a2sfPy_B

📖 Read the blog: https://www.itspmagazine.com/their-stories/your-business-apps-are-bringing-friends-you-didnt-invite-a-brand-story-with-saa-zdjelar-chief-trust-officer-at-reversinglabs-a-black-hat-usa-2025-on-location-brand-story

➤ Learn more about ReversingLabs: https://itspm.ag/reversinglabs-v57b

✦ Catch more stories from #ReversingLabs: https://www.itspmagazine.com/directory/reversinglabs

🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25

#Cybersecurity #SupplyChainSecurity #SoftwareIntegrity #BlackHatUSA #BHUSA25 #ThirdPartyRisk #SBOM #BinaryAnalysis #Compliance #ZeroTrust

Securing IoT products demands deep #BinaryAnalysis. Why? Because today’s IoT software is a tangled web of global supply chains, legacy code & opaque binaries.

In our Security Short, Edwin makes it clear: to protect IoT products, you have to go deeper than the surface.

#IoT

Precompiled binaries are a black box risk. Without source code, you’re left with vendor docs & guesswork.

In our "Security Short", Edwin stresses that the only way to truly understand what’s inside precompiled binaries is through #BinaryAnalysis.

Visibility matters.

Still relying on outdated security tools?

👎 No binary scanning
🕳️ Incomplete #SBOMs
📉 Missed vulnerabilities

Here are 6 signs it's time to upgrade & what to look for 👉 https://finitestate.io/blog/when-to-upgrade-product-security-tools

#ProductSecurity #IoTSecurity #SBOM #BinaryAnalysis #DevSecOps #SCA #SAST

5 Signs Your Product Security Program Has Outgrown Its Current Tools

Your product security stack shouldn’t hold you back. Here are 5 signs it's time to scale beyond homegrown tools and manual SBOMs.

Why do so many vulnerabilities slip past traditional scanning tools?

In our latest blog, we explore the blind spots in traditional SCA/SAST & how Finite State helps teams uncover what others miss 👉https://t.co/R9giOUBz2E

#IoTSecurity #ProductSecurity #BinaryAnalysis #SCA #SAST

Risks of Incomplete Security Scanning Across IoT Product Lifecycles

Incomplete scan coverage leaves critical IoT vulnerabilities hidden. Learn how to close DevSecOps gaps and meet global security regulations.