507 Followers
124 Following
151 Posts

DFIR / CERT / CSIRT @google - nice person - All opinions are mine... . Doing @TimesketchProj stuff. ๐ŸŠโ€โ™‚๏ธ ๐Ÿšฒ ๐Ÿƒโ€โ™‚๏ธ

Time matters

Twitterhttps://twitter.com/alexanderjaeger
Bloghttps://www.alexanderjaeger.de/news/
@bagder for the fins, make those orange who requested info e.g. for a vulnerability

Python developers, be careful! Someone tries to phish PyPI accounts using the domain pypj[.]org.

https://discuss.python.org/t/pypi-org-phishing-attack/100267/7

@ChrisJohnRiley viel Erfolg das Sprachunterrichtsabschlusszertifikat zu bekommen.

Help request. My brother has Stage 4 colorectal cancer.

His life insurance has refused to pay out on a technicality, meaning he and his loved ones cannot afford the mortgage on their home.

I've never asked for anything in return for infosec stuff, but if you have anything spare, please chuck it this direction instead:

https://gofund.me/b9a0d8f4

Burnout is NOT a badge of honour

#FIRSTCON25

We (Steffen Haas, Sebastian Walla, Lars Wallenborn, and Yours Truly) built a dynamic binary instrumentation framework for .NET that gives malware analysts the power of transparent assembly patching at runtime, invisible to the target. With just a few lines of C#, reverse engineers can write their own custom analyzers that instantiate an instrumenter for the heavy lifting, allowing them to focus on the task at hand. We are excited to present our work at @recon next week: https://cfp.recon.cx/recon-2025/talk/PDBLYM/
Breaking Obfuscated .NET Malware with Profiler-Based Dynamic Binary Instrumentation Recon 2025

As malware authors increasingly adopt .NET for its ease of development and stability, they rely on sophisticated obfuscation techniques to thwart analysis. Traditional static deobfuscation approaches often fail against modern protections that incorporate runtime integrity checks. This presentation introduces a framework that leverages .NET profilers to perform dynamic binary instrumentation at the MSIL level. We demonstrate how this approach can bypass dynamic checks in obfuscation schemes, extract encrypted strings, and trace execution flowsโ€”all without modifying the original binary. Through real-world case studies and live demonstrations, we show how this technique provides reverse engineers with a powerful new tool to analyze obfuscated .NET malware.

Don't miss your chance to contribute to CERT-EU's Annual Conference 2025! The Conference will take place in Brussels on 2-3 October, and our Call for Proposals for the Technical Track is still open until April 28th. Share your insights and expertise and help make "Never Gonna Breach You Up" an exceptional edition. Submit now: https://cert.europa.eu/conference/never-gonna-breach-you-up/announcement #CyberSecurity #CERTEU #Conference #CallForProposals
CERT-EU Conference: Never Gonna Breach You Up

CERT-EU Conference: Never Gonna Breach You Up

Burnout in cybersecurity is REAL โ€” and it's more than just needing rest. In this #FIRSTImpressions podcast, #FIRSTCON25 speakers, Desiree Sacher & Carson Zimmerman, share powerful insights๐ŸŽ™๏ธ๐Ÿ”’ Listen now โ†’ https//media.first.org/podcasts/FIRST_Impressions-CarsonDesiree.mp3
@ChrisJohnRiley your sounds will be missed
@lochr nice job.