As always, thanks to those who give a little back for their support!
FORENSIC ANALYSIS
- Akash Patel
Forensic Analysis of SQLite Databases - Alexis Brignoni at ‘Initialization Vectors’
Extraction, Processing, & Querying Apple Unified Logs from an iOS Device - Alexander Fehrmann at Amped
Processing Impression Evidence in Amped FIVE - Brian Maloney
OneDrive Evolution and Schema Updates - Christopher Eng at Ogmini
- Damien Attoe
The Duck Hunters Guide – Blog #7 – Duck AI Chat (Android) - Digital Forensics Myanmar
Deleted Media Files in Android Phone - Dr. Neal Krawetz at ‘The Hacker Factor Blog’
The Sideways Sidecar - Elcomsoft
- Forensafe
iOS Burner - HackTheBox
Creating Linux Symbol Tables for Volatility: Step-by-step guide - Heather Chapentier
LogTimeWarp - kyjonin
Velociraptor Dead-Disk Forensics - Lionel Notari
- Amber Schroader at Paraben Corporation
iOS Hidden & Locked Apps - System Weakness
Android Analysis | Tryhackme - The DFIR Report
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
THREAT INTELLIGENCE/HUNTING
- Abdulrehman Ali
Velvet Chollima APT Adversary Simulation - Yuval Gordon at Akamai
BadSuccessor: Abusing dMSA to Escalate Privileges in Active Directory - Arctic Wolf
The Arctic Wolf State of Cybersecurity: 2025 Trends Report - ASEC
- April 2025 APT Group Trends
- DBatLoader (ModiLoader) Being Distributed to Turkish Users
- April 2025 Infostealer Trend Report
- Fast Flux Technique for Concealing Command and Control (C&C) and Evading Detection
- Etherhide Technique Using Blockchain as C&C Infrastructure
- PyBitmessage Backdoor Malware Installed with CoinMiner
- Case of Larva-25004 Group (Related to Kimsuky) Exploiting Additional Certificate – Malware Signed with Nexaweb Certificate
- Information Leakage Caused by DB Client Tool
- AttackIQ
- Jonathan Nguyen and Gopinath Jagadesan at AWS Security
How to automate incident response for Amazon EKS on Amazon EC2 - Silviu Stahie at Bitdefender
Fake Download of Mission: Impossible – The Final Reckoning Movie Deploys Lumma Stealer - Brian Krebs at ‘Krebs on Security’
- CERT-AGID
Sintesi riepilogativa delle campagne malevole nella settimana del 17 – 23 maggio - Chainalysis
What the Huione Group Shutdown Signals About the Future of Crypto Scam Infrastructure - Check Point
- CISA
- Cisco’s Talos
- Coalition
Explore the latest cyber risks and claims trends from Coalition - Cofense
- CrowdStrike
CrowdStrike 2025 Latin America Threat Landscape Report: A Deep Dive into an Evolving Region - CTF导航
- Jane Ginn at Cyber Threat Intelligence Training Center
Challenges and Considerations in Adopting Vector Databases for Cyber Threat Intelligence - Cyfirma
Weekly Intelligence Report – 23 May 2025 - Joe Wrieden at Cyjax
A Sting on Bing: Bumblebee delivered through Bing SEO poisoning campaign - Damien Lewke
Controlled Chaos: How Coinbase Turned a Breach into a Blueprint - Darktrace
From Rockstar2FA to FlowerStorm: Investigating a Blooming Phishing-as-a-Service Platform - Tesnim Hamdouni, Ian Kretz, Andy Giron, and Eslam Salem at Datadog Security Labs
The obfuscation game: MUT-9332 targets Solidity developers via malicious VS Code extensions - Nesrine Cherrabi at Detect FYI
Hunting Scheduled Tasks - DomainTools
Cluster of Domains Targeting Spotify Job-Seekers - Abdulrahman H. Alamri and Lexie Mooney at Dragos
Dragos Industrial Ransomware Analysis: Q1 2025 - Arda Büyükkaya at EclecticIQ
China-Nexus Threat Actor Actively Exploiting Ivanti Endpoint Manager Mobile (CVE-2025-4428) Vulnerability - Elastic Security Labs
De-obfuscating ALCATRAZ - Elliptic
US Treasury takes 311 action against Huione Group: What this means for you - Flashpoint
- Forescout
- Fortinet
2025 Global Threat Landscape Report - Google Cloud Security Community
Unlocking the Power of Google Threat Intelligence Searches - Huntress
- FBI
Silent Ransom Group Targeting Law Firms - Jacques Portal and Renée Burton at Infoblox
Cloudy with a Chance of Hijacking Forgotten DNS Records Enable Scam Actor - Intel 471
- Invictus Incident Response
Profiling JavaGhost: Tactics, History & Defenses - Jason Smart and Robert di Pietro at pwc
Cyber threats in 2025: What businesses need to know - Lexfo
World Leaks: An Extortion Platform - Logpoint
- Lumen
Inside DanaBot’s Infrastructure: In Support of Operation Endgame II - Mat Fuchs
Ghosts in the Endpoint: How Attackers Evade Modern EDR Solutions - Microsoft Security
Lumma Stealer: Breaking down the delivery techniques and capabilities of a prolific infostealer - Nisos
DPRK Employment Scam Network Targets Remote Tech Jobs - Oleg Skulkin at ‘Know Your Adversary’
- 138. Hunting for File Transfer Sites Access
- 139. LOLBAS Abused by DBatLoader: Detection Opportunities
- 140. Hunting for Masqueraded Malicious Files: Adwind
- 141. Inside 3AM Ransomware Toolkit: GoodSync
- 142. Detecting RMMs from Ransomware Affiliate’s Toolkit: Syncro Live Agent
- 143. Hunting for Qemu Emulator Abuse
- 144. Hunting for Obfuscated PowerShell Scripts
- 145. Detecting Fake CAPTCHA Attacks
- Adithya Vellal at Petra Security
How Attackers Launder Phishing Emails Through Microsoft Infrastructure - Proofpoint
A Brief History of DanaBot, Longtime Ecrime Juggernaut Disrupted by Operation Endgame - Recorded Future
- Red Canary
Intelligence Insights: May 2025 - Adam Harrison at SANS
Shoplifting 2.0: When it’s Data the Thieves Steal - SANS Internet Storm Center
- Dheeraj Kumar and Sina Chehreghani at Securonix
Securonix Threat Labs Monthly Intelligence Insights – April 2025 - Sekoia
ViciousTrap – Infiltrate, Control, Lure: Turning edge devices into honeypots en masse. - Toby G at sentinel.blog
Leveraging Summary Rules in Microsoft Sentinel: A Practical Guide - Mary Braden Murphy at SentinelOne
Caught in the CAPTCHA: How ClickFix is Weaponizing Verification Fatigue to Deliver RATs & Infostealers - Silent Push
- Simone Kraus
- Gangstalking Networks Have Mutated into Transnational Threats — Irregular Warfare Is the Only…
- Silent Invasion: How STASI Gangstalking Fuels Germany’s Migration and Drug Crisis
- From Alerts to Armistice: Why Cybersecurity Without Geopolitics Is a Losing Game
- Countering Cognitive Warfare: The Need for a Defense Ontology Matrix
- Summary of “GLORY-BOT: Karaoke from the Deep”
- SOCRadar
- Sophos
DragonForce targets rivals in a play for dominance - Jose Enrique Hernandez at Splunk
Securing the Network Edge: Cisco Secure Firewall Threat Defense Detections for Splunk - sudo rem
Digging Tunnels – Hunting Adversarial Cloudflared Instances - System Weakness
- Teri Radichel
How To Spot Data Exfiltration Using AWS Cost Anomaly Detection - THOR Collective Dispatch
- Tony Lambert
Squeezing Cobalt Strike Threat Intelligence from Shodan - Buddy Tancio, Khristoffer Jocson, Maylein Tom, Lisa Wu, Ariel Renix, Mohamed Fahmy at Trend Micro
Fake CAPTCHA Attacks Deploy Infostealers and RATs in a Multistage Payload Chain - Damian Archer at Trustwave SpiderLabs
Storm-0558 and the Dangers of Cross-Tenant Token Forgery - Vasilis Orlof at Cyber Intelligence Insights
Profiling Hacktivist Groups,Alliances and Capabilities - WeLiveSecurity
- Andy Gill at ZephrSec
Offensive Threat Intelligence - ZScaler
Operation Endgame 2.0: DanaBusted - Блог Solar 4RAYS
Подробный технический анализ инструментария Obstinate Mogwai. Часть 2: бэкдоры Donnect, DimanoRAT и веб-шелл AntSpy
UPCOMING EVENTS
- Black Hills Information Security
BHIS – Talkin’ Bout [infosec] News 2025-05-27 #livestream #infosec #infosecnews - Cellebrite
Shaping Tomorrow: 2025 Private Sector Trends - Gerald Auger at Simply Cyber
How to Report Phishing Campaign Results to Executives | Lunch & Learn - Magnet Forensics
- SANS
Shaking up the Ransomware Game: Introducing Scattered Spider - Security Onion
Security Onion Conference 2025 Save the Date and CFP - Silent Push
Webinar – Contagious Interview: How a North Korean APT set up three front companies in the U.S. to conceal their activities - The Volatility Foundation
Announcing FTSCon 2025 & In-person Malware and Memory Forensics Training!
PRESENTATIONS/PODCASTS
- Hexordia
Truth in Data: EP7: Bytes and Banter: The Value of Networking in DFIR - Arctic Wolf
Ransomware Without the Ransom - Belkasoft
Applying the Reach Map to Solve a Real Murder Case | Matthew Sorell - Black Hills Information Security
REMASTERED – Log File Analysis: Gleaning Insights From Log Files | Derek & Ethan - BSidesCharm
BSidesCharm 2025 - Cellebrite
Tip Tuesday: Media Categorization Confidence - Deepanshu Khanna
- Huntress
SOC Incident Walkthrough: How a Compromised ScreenConnect Was Used to Deploy More Malware - InfoSec_Bret
SA – SOC336-314 – Windows OLE Zero-Click RCE Exploitation Detected (CVE-2025-21298) - John Hammond
golang obfuscated malware goes crazy - Magnet Forensics
- Matthew Plascencia
LSB Steganography: How to Hide Text in Images | Hiding Data With Programming - MSAB
XAMN Keywords and Filters - MyDFIR
Why Every SOC Analyst Should Be Using ANY.RUN - Off By One Security
- Oxygen Forensics
How Investigators Crack Passwords with KeyDiver - Richard Davis at 13Cubed
A New(ish) Way to Detect Process Hollowing - Sandfly Security
Eliminating Linux Security Blind Spots: Insights from the CISO Series Podcast - SANS
- The Cyber Mentor
LIVE: 🔎ForenSICK! | Cybersecurity | TryHackme | AMA - The Defender’s Advantage Podcast
Responding to a DPRK ITW Incident - The Microsoft Security Insights Show
The Microsoft Security Insights Show Episode 262 – Microsoft Layoffs - Three Buddy Problem
Russia hacks Ukraine war supply lines, Signal blocks Windows screenshots, BadSuccessor vuln disclosure debate - Velocidex Enterprises
Auscert 2025 Detection Engineering Workshop - Volatility Foundation
FTSCon 2024
MALWARE
- 0xMatheuZ
Bypassing LD_PRELOAD Rootkits Is Easy - Any.Run
- Apophis
PowerShell Script — Tactical RMM Installation - Binary Ninja
5.0 Release 2 - CyberDefNerd
- Cybereason
- Eclypsium
Enhanced Threat Detection: Bootloaders, Bootkits, and Secure Boot - Iram Jack
- Christopher Lopez at Kandji
Dissecting the macOS ‘AppleProcessHub’ Stealer: Technical Analysis of a Multi-Stage Attack - Nextron Systems
Katz Stealer Threat Analysis - Anna Širokova and Ivan Feigl at Rapid7
NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign - Karlo Zanki at ReversingLabs
Malicious attack method on hosted ML models now targets PyPI - Amged Wageh at Securelist
Dero miner zombies biting through Docker APIs to build a cryptojacking horde - Security Onion
Quick Malware Analysis: SMARTAPESG / NETSUPPORT RAT / STEALC pcap from 2025-03-26 - Shubho57
Analysis of Hannibal Stealer (newer version of Sharp Stealer) - Socket
- Sucuri
- Vincent D
Reverse Engineering Masslogger Variant Packed with AutoIt - Wordfence
- Zhassulan Zhussupov
AIYA – Mobile malware development book. First edition - Шифровальщики-вымогатели The Digest “Crypto-Ransomware”
LCryptorX
MISCELLANEOUS
- Brett Shavers at DFIR.Training
The DF/IR Grind: No One Cares What Tool You Used - DFIR Dominican
DFIR Jobs Update – 05/19/25 - Forensic Focus
- Major Step Forward For Public Safety As Forensics Europe Expo Co-Locates With The Blue Light Show
- Atola Adds iSCSI Support And Enhanced RAID Features To Its TaskForce Imagers
- Semantics 21 CEO, Dr Liam Owens, Receives Prestigious Outstanding Contribution To Online Child Protection Award At IPPPRI 2025
- Blake Cifelli at GuidePoint Security
You’ve Contained the Threat — What Comes Next? From Recovery to Lessons Learned - Eddie Rudie at Huntress
Building an Incident Response Plan That Works - Juliana T.
No Flags, Just Forensics – My Journey Through the Certified CyberDefender Program - Magnet Forensics
That one artifact: Snapshot to justice - Oxygen Forensics
- Raymond Roethof
Microsoft Defender for Identity Recommended Actions: GPO assigns unprivileged identities to local groups with elevated privileges - Security Onion
Security Onion Documentation printed book now updated for Security Onion 2.4.150!
SOFTWARE UPDATES
- Airbus Cybersecurity
IRIS-Web v2.4.21 - Alexis Brignoni
iLEAPP v2.2.0 - BlueCapeSecurity
Google DriveFS Forensic Extractor & Metadata Exporter v1.0.0 - Canadian Centre for Cyber Security
Assemblyline 4.6.0.3 - Crowdstrike
Falconpy Version 1.5.1 - Digital Sleuth
winfor-salt v2025.6.0 - Doug Metz at Baker Street Forensics
MalChela 2.2 “REMnux” Release - Google
Timesketch 20250521 - IntelOwl
v6.4.0 - jjrboucher
Chromium-Browser-Artifact-Parser - Koen Van Impe
RansomLook Ticker - Nedim Šabić
fibratus v2.4.0 - OpenCTI
6.6.13 - Phil Harvey
ExifTool 13.30 (production release) - Sandfly Security
Sandfly 5.4 – Cisco and Juniper Network Device Support - Security Onion
Security Onion 2.4.150 Hotfix 20250522 now available! - Sigma
r2025-05-21 - Yamato Security
- VirusTotal
YARA v4.5.3
And that’s all for the week! If you think I’ve missed something, or want me to cover something specifically hit me up through the contact page or on the social pipes!


