Profile avatar
mytechnotalent.bsky.social
Author of the world’s most popular Reverse Engineering Tutorial
495 posts 257 followers 10 following
Prolific Poster

A ransomware attack on Notre Dame Uni Australia has disrupted IT systems for 7+ weeks, delaying graduations, blocking transcripts, and causing assignment failures. Staff rely on manual workarounds, but recovery is slow. #Ransomware #CyberSecurity www.abc.net.au/news/2025-03...

Western Alliance Bank (WAB) suffered a data breach (Oct 12–24, 2024) via a zero-day in a third-party file transfer tool, exposing 21,899 customers’ sensitive data. Clop ransomware claimed responsibility. #CyberSecurity #Ransomware www.techmonitor.ai/technology/c...

Ascom’s ticketing system was breached by the “Hellcat ransomware gang” on March 16, 2025, but its IT team contained the attack, no other systems or data were affected, and business remains fully operational as investigations continue. #CyberSecurity #Ransomware www.globenewswire.com/news-release...

Israeli-Russian hacker Rostislav Panev, a LockBit developer, was extradited to the U.S. over $500M in ransomware damages. Linked via malware creds & $230K in crypto. The U.S. offers $10M for LockBit leader Dmitry Khoroshev. #CyberSecurity #Ransomware www.ynetnews.com/article/by9y...

A ransomware attack on Penn-Harris-Madison schools shut down desktops, while Chromebooks and cloud services remained operational. Limited internet affects Canvas but not standardized tests. #CyberSecurity #Ransomware www.southbendtribune.com/story/news/e...

A RansomHub ransomware attack leaked 42GB of student, parent, and faculty data from Riverdale Country School, exposing private schools’ lack of FERPA protections and reflecting a broader K-12 #CyberSecurty #Ransomware surge, including PowerSchool breach. www.bxtimes.com/hackers-leak...

A ransomware attack on Yap’s health department took its entire network offline, disrupting digital health systems. This follows a trend of cybercriminals targeting underfunded government agencies in the Pacific. #CyberSecurity #Ransomware therecord.media/ransomware-a...

friendly reminder to #defcon people everywhere 🚨 The open calls for #defcon33 Contests, Villages and Communities close March 15. If you've got a cool idea to propose, now is the time! Fortune favors the bold. Let's GO. defcon.org/html/defcon-...

Do not measure yourself by the job market, we are in transition. If we knew what those before the Industrial Revolution, I’d surmise a similar taste. What matters is this: we are not defined by jobs but by who we are, humans, creators, innovators. We adapt. Our best days ahead!

Last week I posted a tutorial on how a basic #NeuralNetwork works under the hood. I also wanted to share my #ReverseEngineering a #GPT to help understand the basics of how a GPT works under the hood. github.com/mytechnotale...

If you are looking to get started in #Cloud and #Automation, here is an #Ansible playbook and detailed instructions for provisioning a #Google Cloud Platform (#GCP) free-tier VM instance using Ansible automation. github.com/mytechnotale...

The recent layoffs aren’t about your skill but industry shifts. Use this time to upskill, explore, and build your future. Master automation, dive into AI, and contribute—turn this challenge into momentum. Your next role isn’t just a job; it’s a step toward something greater.

The original #DC540 #DEFCON Tree Of Life local DC chapter dev board. #badgelife

If you are looking to get involved with fighting #Ransomware I have a FREE tutorial on just about every architecture. Learn #ReverseEngineering and be a part of the solution! github.com/mytechnotale...

For those struggling, wisdom is limitless. Adversity fuels reinvention. Build, learn, and create—your resilience will set you apart. Stay focused, stay relentless.

IoT Pico W TLS Server that obtains the Pico W temperature and serves it to a TLS client where this project is designed for a MAC M series client and is based on the Raspberry Pi Foundation’s pico_examples TLS client example. #IoT #Embedded #CyberSecurity github.com/mytechnotale...

If you’re unemployed, use this time to build and learn. Cybersecurity rewards initiative—set up your GitHub, write code, analyze vulnerabilities, contribute to open source. Hiring managers seek dedication, your projects will speak louder than any resume. Keep learning, keep creating, stand out.

I’ve been asked what does my development setup look like.

If you are looking to learn #Embedded #ARM #Assembler from scratch, this is part 2 of a 4 part series, write a linker script, create a vector table, define the reset_handler, _start and work with interrupts all in pure Assembler utilizing an STM32F401ccu6 #microcontroller. github.com/mytechnotale...

4 little STM32F401ccu6 microcontrollers all in a row.

IoT Pico W TLS Client based on the pico_examples tls_client example by the Raspberry PI foundation. #picow #raspberrypi #iot #cybersecurity #tls #embedded github.com/mytechnotale...

Here is my NEW FREE BOOK! Just finished it. A FREE comprehensive step-by-step 8-bit ATmega328P C and Assembler tutorial covering Embedded Software Development to Reverse Engineering. #ReverseEngineering #AVR #C #Assembler github.com/mytechnotale...

I want to thank you all for helping achieve #1 on #GitHub for #ReverseEngineering as there is quite literally nothing more a focus than #CyberSecurity as we move forward!

BLE Interactive #Meshtastic Custom Channel Chat Client which chats on a Custom Channel #DC540 #DEFCON Chapter. github.com/mytechnotale...

The __cortex_m_rt_main_trampoline in Rust embedded sets up the stack and jumps to __cortex_m_rt_main, ensuring proper init. It saves r7 & lr for debugging. In GDB, skip it and set a breakpoint at 0x686 for the real main logic. #RustEmbedded #GDB #ReverseEngineering #Rust

When I speak, I do not speak from a place of non-authority. I would say that #GitHub would properly be a place of authority would it not? If you go to GitHub and search for #ReverseEngineering you will see my project as #1 in the globe. github.com/search?q=Rev...

I heart ARM Assmebler!

If you are looking to learn #Embedded #ARM #Assembler from scratch, this is part 1 of a 4 part series, it teaches you how to write a linker script, create a vector table, define the reset_handler, _start and work with interrupts all in purse Assembler. github.com/mytechnotale...

Serial Interactive #Meshtastic Custom Channel Chat Client which chats on a Custom Channel over serial. github.com/mytechnotale...

Mustang Panda is using MAVInject.exe to inject malware into waitfor.exe, bypassing ESET with a TONESHELL backdoor. Memorizing policies and chasing non-technical certs won’t stop real attackers. #CyberSecurity #ThreatHunting #APT #MAVInject #TONESHELL thehackernews.com/2025/02/chin...

Conducted my 5th guest lecture at @GeorgeMasonU where we hacked an #Embedded #ARM foreign Internet access point!

If you are looking to learn #Embedded #AVR #Engineering, here is an ATmega328P IO driver that I wrote entirely in Assembler. Includes linker script, vector table and bare-metal application. github.com/mytechnotale...

It was great to see everyone tonight at my 5th guest lecture at George Mason University! We conducted an IoT hashtag#Embedded hashtag#ReverseEngineering hack of a foreign internet access point!

🚨 iOS malware alert! SparkCat uses OCR to steal crypto keys from screenshots in apps like WeTink & AnyGPT. Revoke photo access now! 📵 #CyberSecurity #iOS #Malware www.theverge.com/news/606649/...

On with my #meshtastic design work to help contribute to the #DEFCON maker space. This time I created a local LLM that will communicate over the Long-Fast channel over serial. It is experimental but wanted to share with the community. github.com/mytechnotale...

Kimsuky APT shifts tactics: Targets tricked into running PowerShell as admin, installing a remote desktop tool via C2. No exploits—just social engineering. Zero-trust & execution restrictions are key. #CyberSecurity #ThreatIntel thehackernews.com/2025/02/nort...

America’s Best Days Are Ahead—By Looking Back 🇺🇸💻 DeepSeek proved optimization > brute force—bypassing CUDA, using Assembler, and pushing limits. To stay ahead, we need smarter compute AI’s future is leaner, faster, optimized. #AI #Assembler www.technologyreview.com/2025/01/31/1...

Hello @defcon.bsky.social #DEFCON fam. In addition to the serial Meshtastic project, I am working on an experimental #BLE #Meshtastic app using BLE on Long Fast with the Python API. github.com/mytechnotale...

Great job Matt Brown for the walk-through on the Patient Monitor. It is chilling to see live patient data flowing over the wire to which could be easily exfiltrated. We need to do a better job on securing our #data particularly in #healthcare and critical infra. youtu.be/3mwuzyEQwGM?...

Hello @defcon.bsky.social #DEFCON fam. I am working on an experimental #Meshtastic app using serial on Long Fast with the Python API. Here it is, it sorta works, and will be updating it soon. github.com/mytechnotale...

🚨 LLMjacking is on the rise! Attackers steal API keys to access LLMs like OpenAI & DeepSeek—sticking victims with massive bills. 💰 One AWS user’s $2/month bill hit $20K in hours! #CyberSecurity #LLMjacking #AIThreats #DeepSeek www.darkreading.com/application-...

Am I showing my age? #C

🚀 Ghidra 11.3 is here! 🚀 🔹 Java 21 required 🔹 Python 3.9–3.13 support 🔹 Fix for XWindows crashes (CVE-2024-31083) 🔹 Ghidra Server 9.2+ compat 🔹 Rebuild native components on older OS (e.g., CentOS 7.x) #Ghidra #ReverseEngineering #CyberSecurity 🔗 github.com/NationalSecurityAgency/ghidra/releases

The rise of DeepSeek R1; attackers are spinning up fake DeepSeek websites, phishing scams, and malicious Python packages to steal data, crypto wallets, and credentials. #CyberSecurity #AI #DeepSeek #Phishing #ThreatIntelligence #Infosec #HackerDefense www.darkreading.com/cyber-risk/d...

🚀 China is hand-tuning Assembler to out-optimize us. The U.S. must revive low-level programming—not just for malware RE, but to push AI efficiency to the max. Assembler isn’t dead—it’s an edge. #AI #Cybersecurity #ReverseEngineering #Assembler #DeepSeek www.technologyreview.com/2025/01/31/1...

🚨 Abandoned AWS S3 buckets = silent supply chain takeover. Attackers can re-register deleted bucket names & hijack software updates, API calls, & infra deployments—injecting malware or backdoors at scale. AWS must block reuse. Audit your S3 refs! 🔥 #CloudSecurity www.darkreading.com/remote-workf...