Reverse Dungeon – Telegram
Reverse Dungeon
4.15K subscribers
719 photos
59 videos
985 files
2.25K links
Reverser's notes
The Mentor
1989
Download Telegram
Forwarded from CyberSecurityTechnologies
red_report_2025.pdf
6.7 MB
#Analytics
#Threat_Research
"Red Report 2025:
The Top 10 Most Prevalent MITRE ATT&CK Techniques. SneakThief and The Perfect Heist".

// This year's findings highlight a new era of adversarial sophistication in infostealer attacks, epitomized by malware like "SneakThief," which executed in a kill chain what has come to be known as "The Perfect Heist." Although the SneakThief malware is a fictitious name in this scenario, its attack patterns reflect real-world incidents. This advanced threat leverages stealth, persistence, and automation to infiltrate networks, bypass defenses, and exfiltrate critical data
1
Forwarded from CyberSecurityTechnologies
Forwarded from Source Byte
Virus disguised Sogou input method, malicious noscript embedded in formal signature

https://zhuanlan.zhihu.com/p/1949553669189116360
2
Forwarded from Linux Kernel Security (Andrey Konovalov)
A 0-click exploit chain for the Pixel 9 Part 2: Cracking the Sandbox with a Big Wave

Article by Seth Jenkins about exploiting a use-after-free in the driver for BigWave — an AV1 decoding hardware component present on Pixel SOCs.

Seth used the bug to escalate privileges from the mediacodec SELinux context and obtain root on Pixel 9.

This exploit is a part of an RCE chain developed by Seth and Natalie Silvanovich.
1
Forwarded from HyperDbg News & Updates
Slides and recordings for our @FOSDEM talks are up! Join [Björn Ruytenberg] and [Sina Karvandi] for an in-depth introduction into @HyperDbg 's features and internals, or find out what's the latest in anti-anti-debugging techniques and HV transparency for malware reversing:

- https://fosdem.org/2026/schedule/event/APB9WC-mbec_slat_and_hyperdbg_hypervisor-based_kernel-_and_user-mode_debugging/

- https://fosdem.org/2026/schedule/event/CDPRDX-invisible_hypervisors_debugging_with_hyperdbg/
5
Forwarded from Source Byte
Bypassing Kernel32.dll for Fun and Nonprofit

https://ziglang.org/devlog/2026/#2026-02-03
5
Forwarded from MEPhI CTF (Pavel Blinnikov)
Письмо в редмондскую компанию Microsoft:

"Я 11 лет считаю оффсеты до поля UniqueProcessId у вас в EPROCESS — он то 744, то 736, иногда 1088, а вчера вообще 464 был. Вы что там, сумасшедшие что ли все???"

by @thsage
🐳12❤‍🔥8