RSS.Social

Home on Matt Suiche

follow: @[email protected]

Posts

Building Agents for Small Language Models: A Deep Dive into Lightweight AI

ELEGANTBOUNCER: When You Can't Get the Samples but Still Need to Catch the Threat

Detecting CVE-2025-43300: A Deep Dive into Apple's DNG Processing Vulnerability

Bob and Alice in Kernel-land - Part 3

Bob and Alice in Kernel-land - Part 2

Financial Forensics in a fragmented ecosystem

Election Security - Friday Review

Bob and Alice in Kernel-land

Researching Triangulation: Detecting CVE-2023-41990 with single byte signatures.

Researching BLASTPASS: Analysing the Apple & Google WebP POC file - Part 2

Researching BLASTPASS: Detecting the exploit inside a WebP file - Part 1

Researching FORCEDENTRY: Detecting the Exploit With No Samples

POC 2022 - Korea - Keynote 🦀

Vegas 2022 - A web3 security review

Magnet Forensics Acquires Cybersecurity Software Firm Comae Technologies

SUNBURST & Memory Analysis

Azure Sphere Internals - Overview

SMBaloo - Building a RCE exploit for Windows ARM64 (SMBGhost Edition)

Twitter's Information Operations - An OSINT Analysis

Facebook's Coordinated Inauthentic Behavior - An OSINT Analysis

How to Solve the Blindspots of Event-Driven Detection

Rethinking Logging for Critical Assets

Smart Contract Languages to Follow

Porosity: A Decompiler For Blockchain-Based Smart Contracts Bytecode

Petya.2017 is a wiper not a ransomware

Petya— Enhanced WannaCry ?

Lessons from TV5Monde 2015 Hack

WannaCry — Decrypting files with WanaKiwi + Demos

WannaCry — Links to Lazarus Group

WannaCry — New Variants Detected!

WannaCry — The largest ransom-ware infection in History

PASSFREELY: Oracle & SWIFT at risk

ShadowBrokers: The NSA compromised the SWIFT Network

Windows 7 and Windows Server 2008 R2 djoin (Offline Domain Join) utility.

Retrieving MmPhysicalMemoryBlock regardless of the NT version

Check your system virginity in less than 60 seconds.

X-Ways Forensics Beta 2 and hibernation file. (coincidence?)