Profile avatar
attrc.bsky.social
Volatility Core developer, Dir. of Research Volexity, LSU Cyber
11 posts 5,722 followers 1,114 following
Regular Contributor

I will be attending RE//verse next weekend in Orlando. Let me know if you will be around and want to meet up: re-verse.io

Check out this awesome work by our threat intel team!

If you will be at @wildwesthackinfest.bsky.social next week then be sure to attend my talk!

On Thursday, Feb 6, @attrc.bsky.social will be at @wildwesthackinfest.bsky.social to present "Effectively Detecting Modern Code Injection Techniques with Volatility 3". Conference agenda: wildwesthackinfest.com/wild-west-ha.... 

 #dfir #memoryforensics #Volatility3 @volatilityfoundation.org

The deadline for paper submissions to the 25th Annual DFRWS USA is quickly approaching - January 20th for abstracts and 27th for full papers - submit ASAP! dfrws.org/conferences/... #DFIR #infosec

@volexity.com’s latest blog post describes in detail how a Russian APT used a new attack technique, the “Nearest Neighbor Attack”, to leverage Wi-Fi networks in close proximity to the intended target while the attacker was halfway around the world.    Read more here: www.volexity.com/blog/2024/11...

Russian spies—likely Russia's GRU intelligence agency—used a new trick to hack a victim in Washington, DC: They remotely infected another network in a building across the street, hijacked a laptop there, then breached the target organization via its Wifi. www.wired.com/story/russia...

A long blog post will eventually drop about this case and it will be one of the craziest DFIR stories in history! If you can see the talk in person then do it!!

I created the ICS/OT Security starter pack. Please give it a follow and let me know if I'm missing anyone. go.bsky.app/SQygf7K

This thread 🧵 on NSO Group revelations from recent legal filings is one raised eyebrow after another.

Our talk from @defcon.bsky.social is now available! In the presented research, we document every EDR bypass technique used in the wild along with how to detect it using new memory forensics techniques and Volatility plugins. Feedback appreciated! www.youtube.com/watch?v=Pmqv...

Check out the back of my new favorite @volexity.bsky.social shirt that I acquired at FTSCon! Using memory forensics to find 0days in network appliances and high value applications will never get old!

Our talk from @defcon.bsky.social is now available! In the presented research, we document every EDR bypass technique used in the wild along with how to detect it using new memory forensics techniques and Volatility plugins. Feedback appreciated! www.youtube.com/watch?v=Pmqv...