As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Akash Patel
- Brian Maloney
OneDriveExplorer now supports Microsoft.FileUsageSync.db - Christopher Eng at Ogmini
- Derek Eiri
Exploring X-Ways Forensics 21.5 Beta 3d, BitLocker Decryption - Elcomsoft
- Forensafe
iOS Google Voice - Jason Yung
You may not want your lastlog in your Linux Forensics journey - Salvation DATA
Understanding BFU and AFU in iPhone Forensics and Encryption - Muhammad Abdullahi at System Weakness
How to Recover Deleted Files with Python
THREAT INTELLIGENCE/HUNTING
- Faan Rossouw at Active Countermeasures
Malware of the Day – C2 over ICMP (ICMP-GOSH) - Adam at Hexacorn
Shell32.dll, #44 lolbin - ASEC
- Ayelen Torello at AttackIQ
Emulating the Terrorizing VanHelsing Ransomware - Lawton Pittenger and Michael Leighty at AWS Security
Protect against advanced DNS threats with Amazon Route 53 Resolver DNS Firewall - Barracuda
- Jade Brown at Bitdefender
Bitdefender Threat Debrief - Lawrence Abrams at BleepingComputer
iClicker hack targeted students with malware via fake CAPTCHA - Bob Rudis
Suriest: Suricata Rule Validation As A (REST) Service - Brad Duncan at Malware Traffic Analysis
- Brian Krebs at ‘Krebs on Security’
Breachforums Boss to Pay $700k in Healthcare Breach - CERT-AGID
- ChamX
Council of Tropical Affairs APT-Inspired Threat Hunting Walkthrough - Check Point
- Cisco’s Talos
- Cleafy
SuperCard X: exposing a Chinese-speaker MaaS for NFC Relay fraud operation - Pagilla Manohar Reddy at CloudSEK
Brief Disruptions, Bold Claims: The Tactical Reality Behind the India-Pakistan Hacktivist Surge - Jason Wood at Corelight
How to Threat Hunt for Volt Typhoon Using NDR | Corelight - Curated Intelligence
New Community Resource: Attribution to IP - Cyfirma
Weekly Intelligence Report – 16 May 2025 - Damien Lewke
Threat Hunting for AI-Generated Malware: A Practical Framework - Daniel Koifman
Detection Pitfalls You Might Be Sleeping On - Darktrace
Catching a RAT: How Darktrace neutralized AsyncRAT - Martin McCloskey at Datadog Security Labs
Tales from the cloud trenches: The Attacker doth persist too much, methinks - Disconinja
Weekly Threat Infrastructure Investigation(Week19) - Dragos
Dragos Knowledge Pack Update: Strengthen Your Detection of Ransomware Threats - DTex Systems
i³ Threat Advisory: Inside the DPRK: Spotting Malicious Remote IT Applicants - EclecticIQ
- Elastic Security Labs
Misbehaving Modalities: Detecting Tools, Not Techniques - Elliptic
- Farhan Ahmed Bhutto
Hunting Hidden Threats in WSL: Key Artifacts & Automated Extraction Script - Flashpoint
Flashpoint Investigation: Uncovering the DPRK’s Remote IT Worker Fraud Scheme - Genians
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story) - Google Cloud Security Community
- Google Threat Analysis Group
TAG Bulletin: Q1 2025 - GreyNoise
Ivanti EPMM Zero-Days: Reconnaissance to Exploitation - Group-IB
Disguised Cyber Risks On The Colombian Shore: The Insurance Trap - Robert Bell, Patrick Bukowski, and Blake Cifelli at GuidePoint Security
Navigating Incident Response Documentation - Hunt IO
Shared SSH Keys Expose Coordinated Phishing Campaign Targeting Kuwaiti Fisheries and Telecom Sectors - Huntress
- InfoSec Write-ups
- Intel 471
- Kaspersky Lab
The ransomware landscape in 2025 | Kaspersky official blog - Kijo Ninja
DLL injection fundamental — Part3 - Kroll
- Microsoft Security
Marbled Dust leverages zero-day in Output Messenger for regional espionage - Nathan Richards at Birdwell
Who are Medusa Ransomware Group? - Natto Thoughts
From the World of “Hacker X Files” to the Whitewashed Business Sphere - Oleg Skulkin at ‘Know Your Adversary’
- Palo Alto Networks
- Proofpoint
TA406 Pivots to the Front - Resecurity
How Interlock Ransomware Affects the Defense Industrial Base Supply Chain - SANS Internet Storm Center
- It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities, (Mon, May 12th)
- Another day, another phishing campaign abusing google.com open redirects, (Wed, May 14th)
- Web Scanning SonicWall for CVE-2021-20016 – Update, (Wed, May 14th)
- xorsearch.py: Python Functions, (Sat, May 17th)
- Securelist
Threat landscape for industrial automation systems in Q1 2025 - Security Joes
Modern Incident Response: Tackling Malicious ML Artifacts - Thomas Roccia at SecurityBreak
Inside the AI x Security Arsenal I’ve Built - Jim Walter at SentinelOne
Anti-Ransomware Day 2025: 10 Years of RaaS and the Making of a Billion-Dollar Business - Silent Push
- SOCRadar
- Sophos
- Beyond the kill chain: What cybercriminals do with their money (Part 1)
- Beyond the kill chain: What cybercriminals do with their money (Part 2)
- Beyond the kill chain: What cybercriminals do with their money (Part 3)
- Beyond the kill chain: What cybercriminals do with their money (Part 4)
- Beyond the kill chain: What cybercriminals do with their money (Part 5)
- Stephan Berger
Linux Capabilities Revisited - Aryan Luthra at Sublime Security
How ASA thinks: The technical architecture of Sublime’s Autonomous Security Analyst - System Weakness
- This Malware Uses Steam Domains to Steal Your Identity — A Deep Dive into Azorult
- Building a Real-World SOC Analyst Lab: Threat Detection, Response Automation & SIEM Integration
- Logs, Sweat, and Suricata: My Journey to a Real-Time Threat Hunting Powerhouse
- ️ Hunting IDOR: A Deep Dive into Insecure Direct Object References
- When Logs Become Lessons: Debugging My Way Through ELK and Life
- THOR Collective Dispatch
- Pierre Lee, Vickie Su, and Philip Chen at Trend Micro
Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan - Megan Nilsen at TrustedSec
Purpling Your Ops - Matthieu Faou at WeLiveSecurity
Operation RoundPress
UPCOMING EVENTS
- Black Hills Information Security
BHIS – Talkin’ Bout [infosec] News 2025-05-19 #livestream #infosec #infosecnews - Cellebrite
Fighting Human Trafficking with Digital Intelligence - Eclypsium
Protecting the Exposed Network Edge from APTs, Zero Days, and Ransomware - Magnet Forensics
- Silent Push
Workshop – Scanning Dark Web Infrastructure to Detect Hidden Threats With Silent Push
PRESENTATIONS/PODCASTS
- Hexordia
Truth in Data: EP6: My Fridge is a Witness? The Wild World of IoT Forensics – Guest Sarah Hayes - Alexis Brignoni
Digital Forensics Now Podcast – S2 E12 - Anuj Soni
Malware Analysis with capa & Binary Ninja Plugins (API Hashing) - Behind the Binary by Google Cloud Security
EP09 Thomas Roccia – AI, Data Visualization, and the Future of Security Research - Black Hat
- Reasonable Regs vs Red Tape: How Should Governments Tackle the Cyber Intrusion Market
- Security analysis of Residential Gateways and ISPs: global network domination is (sneakily) possible
- When (Remote) Shells Fall Into The Same Hole: Rooting DrayTek Routers Before Attackers Can
- Unmasking State-Sponsored Mobile Surveillance Malware from Russia, China, and North Korea
- UNC1860 and The Temple of Oats – Iran’s hidden hand in Middle Eastern Networks
- BlueMonkey 4n6
Mounting Bitlockered Drive Images – opening an E01 of a Bitlockered volume using Linux - Cellebrite
Tip Tuesday: Creating Custom Tags in PA - Cyacomb
Guardians for Podcast (Episode 4 with Simon Rose) - Cyber Social Hub
- Deepanshu Khanna
Docker forensics – in-depth threat analysis for threat hunters - Huntress
- InfoSec_Bret
SA – SOC338-316 – Lumma Stealer – DLL Side-Loading via Click Fix Phishing - John Hammond
- Magnet Forensics
AI Unpacked #2 : Pillars of Magnet Forensics’ approach to AI - Matthew Plascencia
- Michael Haggis
- Microsoft Security Community
Advanced Threat Detection with Defender XDR Community Queries - Microsoft Threat Intelligence Podcast
BadPilot: Inside Seashell Blizzard’s (AKA Sandworm) Global Cyber Espionage Campaign - MSAB
GK Import - MyDFIR
Cybersecurity Project: Active Directory 2.0 | Part 5 - Nuix
- Sandfly Security
Eliminating Linux Security Blind Spots: Insights from the CISO Series Podcast - The Microsoft Security Insights Show
The Microsoft Security Insights Show Episode 261 – Michael Fiorina, Tanium - The Weekly Purple Team
Crippling Defender with DefendNot | Purple Team Attack & Detection Walkthrough - Three Buddy Problem
A Coinbase breach with bribes, rogue contractors and a $20M ransom demand
MALWARE
- Any.Run
Evolution of Tycoon 2FA Defense Evasion Mechanisms: Analysis and Timeline - Deep Instinct
Excel(ent) Obfuscation: Regex Gone Rogue - Tonmoy Jitu at Denwp Research
More_Eggs? A Venom Spider Backdoor Targeting HR - Dr Josh Stroschein
🎙️NEW episode of Behind the Binary featuring Thomas Roccia! - Fortinet
- G Data Security
- Iram Jack
- Alon Shekalim at Morphisec
Breaking Down Ransomware Encryption: Key Strategies, Algorithms and Implementation Trends - Pulsedive
Albabat 2.0.0 Decoded: A Config-Driven Design - Akshay Thorve at Qualys
Fileless Execution: PowerShell Based Shellcode Loader Executes Remcos RAT - Karlo Zanki at ReversingLabs
- Shubho57
Analysis of Kimsuky APT Group (Powershell Payloads one of them attributed to XWorm RAT) - Socket
- Technical Outcast
Obfuscated JavaScript in Phishing Kits - István Márton at Wordfence
- 82,000 WordPress Sites Affected by Arbitrary File Upload Vulnerability in TheGem WordPress Theme
- 50,000 WordPress Sites Affected by PHP Object Injection Vulnerability in Uncanny Automator WordPress Plugin
- 10,000 WordPress Sites Affected by Remote Code Execution Vulnerability in UiPress lite WordPress Plugin
- Yasser Magdy
Dissecting an Obfuscated PowerShell Dropper: Evasion Techniques & Detection Tactics - Zhassulan Zhussupov
Malware development trick 47: simple Windows clipboard hijacking. Simple C example. - ZScaler
Technical Analysis of TransferLoader - Шифровальщики-вымогатели The Digest “Crypto-Ransomware”
MISCELLANEOUS
- Douglas Holland at Akamai
Locked Out and Held for Ransom: A City’s Battle Against Cybercrime - Belkasoft
Navigating the Future: Top 6 Trends Shaping Modern DFIR in 2025 - Manny Kressel at Bitmindz
Why Using a Processing Engine is Better than a Forensic Workstation - Black Cell
The Ransomware Attack Lifecycle: 7 Stages to Know - Brett Shavers
The Two Bulls of DF/IR: Why Charging Ahead Still Loses the Case - DFIR Dominican
- Forensic Focus
- Accelerating Investigations With AI-Powered Media Classification
- Hexordia’s Jessica Hyde: Navigating The Future Of Digital Forensics
- “You Knew What You Were Signing Up For” – A Harmful Narrative In DFIR?
- Amped Authenticate Update Empowers Investigators With Expanded Tools For Deepfake Detection And Video Integrity Analysis
- Digital Forensics Round-Up, May 14 2025
- Forensic Focus Digest, May 16 2025
- Denis Nagayuk & Francisco Dominguez at Hunt & Hackett
Improving AFD Socket Visibility for Windows Forensics & Troubleshooting - Magnet Forensics
Underfunded and overlooked: Why your DFIR team deserves a seat at the table - Mat Fuchs
- Oxygen Forensics
- Sam Straka at Red Canary
Getting started with Conditional Access: Comparing Entra ID Conditional Access with Okta - SANS
OT Ransomware on the Rise: What You Need to Know and How to Prepare - SecurityAura
Looking Back On #100DaysOfKQL - Taggart Tech
ClickFix Fixes Ranked
SOFTWARE UPDATES
- Amped
Amped Replay Update 37369: New Report Design, New Hide Features, Improved Audio/Video Loading, and More! - Datadog Security Labs
GuardDog v2.6.0 - Digital Detective
NetAnalysis® 4: Boost Your Digital Forensics with Advanced Browser Analysis - Digital Detective
NetAnalysis v4.0 - Elcomsoft
iOS Forensic Toolkit 8.70: expanded Apple Watch support and offline agent installation - Lethal Forensics
Microsoft-Analyzer-Suite v1.5.0 - Magnet Forensics
Magnet Witness 1.8: Wyze support, multi-stream file formats, and improving review - MISP
- MSAB
Now available: XRY 11.0.1 - OpenCTI
6.6.11 - Security Onion
Security Onion 2.4.150: Celebrating Mother’s Day with MoM (Manager of Managers) - SigmaHQ
pySigma v0.11.23 - Xways
X-Ways Forensics 21.5 Beta 4 - Brian Maloney
OneDriveExplorer v2025.05.13 - IsoBuster
IsoBuster 5.6 released - The Volatility Foundation
Announcing the Official Parity Release of Volatility 3!
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!


