Exclusive: I did a Q&A session with an AI powered Threat intelligence bot — here’s what you should…I am excited to do my first time ever a QA session with an Artificial Intelligence powered, Threat Intelligence Bot.Nov 14, 2023Nov 14, 2023
Multiple Linux Backdoors Discovered Targeting Bitcoin Core Developer — Technical AnalysisAn in-depth technical analysis of various backdoors discovered in Luke’s compromised Linux server.Jan 19, 20231Jan 19, 20231
Published inConfiantL’art de l’évasion: How Shlayer hides its configuration inside Apple proprietary DMG filesIntroDec 24, 2022Dec 24, 2022
Published inConfiantHow SeaFlower 藏海花 installs backdoors in iOS/Android web3 wallets to steal your seed phraseDuring the course of our work at Confiant, we see malicious activity on a daily basis. What matters the most for us is the ability to:Jun 12, 2022Jun 12, 2022
Published inConfiantProfiling hackers using the Malvertising Attack Matrix by ConfiantWhat is Malvertising?Oct 18, 2021Oct 18, 2021
Published inConfiantOSX/Hydromac: A new macOS malware leaked from a Flashcards appAt @ConfiantIntel we had some “luck” finding a new malware targeting the new Apple flagship M1 computers. I put “luck” between quotes, as…Jun 3, 2021Jun 3, 2021
Initial analysis of PasswordState supply chain attack backdoor codeOne hour ago, I became aware of this supply chain attack from tweet by Kim Zetter. If you don’t follow her please do and subscribe to her…Apr 23, 2021Apr 23, 2021
How to extract Python source code from Py2App packed Mach-O BinariesI got many requests after my last tweet on the discovery of a backdoored Electrum wallet, that was notarized by Apple !Mar 6, 2021Mar 6, 2021
Published inConfiantInternet Explorer CVE-2019–1367 Exploitation — part 3Shellcode AnalysisJul 14, 20201Jul 14, 20201
Published inConfiantInternet Explorer CVE-2019–1367 Exploitation — part 2In Part1 we explained CVE-2019–1367 vulnerability root cause. In this part we will discuss how this bug was exploited in the wild to…Jul 13, 2020Jul 13, 2020