Ján Trenčanský
@j91321.bsky.social
📤 186
📥 216
📝 121
EDR R&D team lead at ESET. Opinions are my own. @
[email protected]
reposted by
Ján Trenčanský
Catalin Cimpanu
7 days ago
Looks like these were released minutes after Microsoft released Patch Tuesday... I don't know if this is trolling or genuine anger
1
10
2
Honestly if the account didn't release two working exploits before, I'd dismiss YellowKey Bitlocker bypass as an elaborate troll. Just read check the README
github.com/Nightmare-Ec...
loading . . .
GitHub - Nightmare-Eclipse/YellowKey: YellowKey Bitlocker Bypass Vulnerability
YellowKey Bitlocker Bypass Vulnerability. Contribute to Nightmare-Eclipse/YellowKey development by creating an account on GitHub.
https://github.com/Nightmare-Eclipse/YellowKey
7 days ago
0
0
0
Babe wake up, new Windows privesc just dropped.
#GreenPlasma
. Oh and also Bitlocker bypass
#YellowKey
github.com/Nightmare-Ec...
loading . . .
GitHub - Nightmare-Eclipse/GreenPlasma: GreenPlasma Windows CTFMON Arbitrary Section Creation Elevation of Privileges Vulnerability
GreenPlasma Windows CTFMON Arbitrary Section Creation Elevation of Privileges Vulnerability - Nightmare-Eclipse/GreenPlasma
https://github.com/Nightmare-Eclipse/GreenPlasma
7 days ago
0
0
1
reposted by
Ján Trenčanský
Catalin Cimpanu
23 days ago
Intellexa had a secret US partner with government ties that fed it Android and iOS exploits on a revenue sharing scheme 🫥 via
@jurrevanbergen.nl
www.antenna.gr/ereynes/arti...
loading . . .
https://www.antenna.gr/ereynes/article/4/995197/pos-to-predator-apektise-psifiaka-opla-poy-proorizontan-gia-dytikes-mystikes-ypiresies
0
12
11
reposted by
Ján Trenčanský
Rachel Andrew
29 days ago
Gordon Ramsey, technical writing, and the importance of people who care
rachelandrew.co.uk/archives/202...
loading . . .
https://rachelandrew.co.uk/archives/2026/04/21/the-importance-of-people-who-care/
5
67
34
reposted by
Ján Trenčanský
DrSinBin
about 1 month ago
I'm not joking when I say mRNA technology is more important than "AI" and it's a tragedy we're throwing billions into one while our government is aggressively defunding the other.
add a skeleton here at some point
117
15094
5654
reposted by
Ján Trenčanský
ESET Research
about 1 month ago
Cisco Talos recently published an analysis of an EDR killer used by the
#Qilin
#ransomware
gang.
#ESETresearch
tracks this threat as
#CardSpaceKiller
and we recently provided additional insights in our blog
www.welivesecurity.com/en/eset-rese...
1/6
loading . . .
EDR killers explained: Beyond the drivers
ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers.
https://www.welivesecurity.com/en/eset-research/edr-killers-explained-beyond-the-drivers/
1
11
4
ESET Inspect killed the Axios compromise execution chain on Windows straight out-of-the-box. Renaming PowerShell is a terrible tradecraft if it was intended as EDR evasion. "Renamed PowerShell Execution [D0411]" is a simple yet solid EDR indicator.
about 2 months ago
1
0
1
reposted by
Ján Trenčanský
ESET Research
about 2 months ago
#ESETresearch
has identified a Silver Fox campaign that actively takes advantage of the current annual tax filing and organizational change season in Japan, a period when companies generate a high volume of legitimate financial and HRrelated comms.
www.welivesecurity.com/en/business-...
1/8
loading . . .
A cunning predator: How Silver Fox preys on Japanese firms this tax season
Silver Fox is back in Japan, spoofing tax and HR emails timed to the one season when many people don’t think twice about opening them
https://www.welivesecurity.com/en/business-security/cunning-predator-how-silver-fox-preys-japanese-firms-tax-season/
1
5
3
reposted by
Ján Trenčanský
Whitney Merrill
about 2 months ago
This is a correct take. AI compliance is over hyped. It’s just a flavor of privacy compliance. Processes and people help mature compliance here.
add a skeleton here at some point
2
40
15
reposted by
Ján Trenčanský
Eric Geller
about 2 months ago
Is your business thinking about going all-in on AI for cyber defense? Security experts have a warning: Don't do that. "If Claude wrote your YARA rules, they’re probably crap." My story from
#RSAC
:
www.cybersecuritydive.com/news/ai-cybe...
3
23
15
reposted by
Ján Trenčanský
Jake Williams
about 2 months ago
Paying to market your company on an Incel Camino is *A Choice*. I didn't know anything about SecureOS before I saw this. Now I'm on a mission to ensure that doesn't change.
11
80
14
reposted by
Ján Trenčanský
liberated horkos: a hero reborn
2 months ago
in the age of networked systems where major powers conduct conflicts either through proxies or at stand-off distances, expecting an adversary to abdicate a meaningful means of asymmetric cost imposition simply because of your morality is utterly, laughably naive. the message for defense: git gud.
1
90
13
reposted by
Ján Trenčanský
ESET Research
2 months ago
#ESETresearch
analyzed more than 80 EDR killers, seen across real-world intrusions, and used ESET telemetry to document how these tools operate, who uses them, and how they evolve beyond simple driver abuse.
www.welivesecurity.com/en/eset-rese...
1/6
1
14
9
reposted by
Ján Trenčanský
abadidea
3 months ago
June 2023: a Google data center in France floods and they call it a “water intrusion event” February 2026: an Amazon data center in the Middle East is literally struck by a fucking ballistic missile in a hot war and they call it “impacted by objects”
https://health.aws.amazon.com/health/status
5
73
33
Definitely a little bit of projection from Microsoft here 😂
www.microsoft.com/en-us/securi...
3 months ago
0
2
0
reposted by
Ján Trenčanský
Microsoft Threat Intelligence
3 months ago
Microsoft Defender researchers observed attackers using yet another evasion approach to the ClickFix technique: Asking targets to run a command that executes a custom DNS lookup and parses the `Name:` response to receive the next-stage payload for execution.
1
8
1
3 months ago
0
0
0
reposted by
Ján Trenčanský
Nick Pettigrew
3 months ago
I'm convinced AI is our generation's radium - a discovery with genuinely useful applications in specific, controlled circumstances that we stupidly put in everything from kid's toys to toothpaste until we realised the harm far too late where future generations will ask if we were out of our minds.
add a skeleton here at some point
248
17919
5695
reposted by
Ján Trenčanský
Mike Schuster
3 months ago
Breaking: Tragedy at the Winter Olympics
72
8673
2633
reposted by
Ján Trenčanský
Catalin Cimpanu
4 months ago
Russian GRU-linked cyber-espionage group APT28 is now using an Office zero-day disclosed last week for spear-phishing campaigns targeting Ukrainian targets, per a new Ukraine CERT report
cert.gov.ua/article/6287...
loading . . .
CERT-UA
Урядова команда реагування на комп’ютерні надзвичайні події України, яка функціонує в складі Державної служби спеціального зв’язку та захисту інформації України.
https://cert.gov.ua/article/6287250
0
4
4
reposted by
Ján Trenčanský
ESET Research
4 months ago
#BREAKING
#ESETresearch
provides technical details on
#DynoWiper
, a data‑wiping malware used in a data‑destruction incident on December 29, 2025, affecting a company in Poland’s energy sector.
www.welivesecurity.com/en/eset-rese...
1/5
loading . . .
https://www.welivesecurity.com/en/eset-research/dynowiper-update-technical-analysis-attribution/
1
10
10
Extensive report by CERT.PL on Poland’s energy grid incident.
cert.pl/en/posts/202...
loading . . .
Energy Sector Incident Report - 29 December 2025
CERT Polska presents a report on the analysis of an incident in the energy sector that occurred on 29 December 2025. The attacks were destructive in nature and targeted wind and photovoltaic farms, a ...
https://cert.pl/en/posts/2026/01/incident-report-energy-sector-2025/
4 months ago
0
4
6
Release of ESET Protect Cloud 7.0 marks the beginning of big changes for our EDR cloud console. Advanced Search, the main feature being rolled out, allows you to search through indicators using Lucene. It's a more log-based approach enabling access to the underlying EDR and AV data.
4 months ago
1
0
0
reposted by
Ján Trenčanský
evacide
4 months ago
Can we just tell all of the "Signal is an op" guys that all of the real high-opsec organizing is being done on some Telegram channel so they can all go there and cosplay at each other?
6
219
28
Looks like, it really is release day tomorrow.
4 months ago
0
0
0
reposted by
Ján Trenčanský
ESET Research
4 months ago
#BREAKING
#ESETresearch
identified the wiper
#DynoWiper
used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malware’s design clearly indicates destructive intent. 1/5
1
34
35
reposted by
Ján Trenčanský
Kim Zetter
4 months ago
Exclusive: A cyberattack targeting Poland's energy infrastructure in December used wiper malware that would have erased grid computers and rendered them inoperable had it not been thwarted, a researcher at @ESET told me. The researcher calls the attack "unprecedented" for Poland and "substantial"
loading . . .
Cyberattack Targeting Poland’s Energy Grid Used a Wiper
A cyberattack that targeted power plants and other energy producers in Poland at the end of December used malware known as a “wiper” that was intended to erase computers and cause a power outage and o...
https://www.zetter-zeroday.com/cyberattack-targeting-polands-energy-grid-used-a-wiper/
2
62
66
reposted by
Ján Trenčanský
Catalin Cimpanu
4 months ago
Now you understand why every pro-Kremlin Twitter bot has spent 90% of its time over the past decade defending or pushing crypto and blockchain tech while randomly publishing some political tweet once in a while?
add a skeleton here at some point
2
24
21
reposted by
Ján Trenčanský
Catalin Cimpanu
4 months ago
The data on more than 8,000 users of far-right dating site WhiteDate was scraped and leaked online after its administrators didn't secure their WordPress site properly
cybernews.com/security/inv...
loading . . .
Investigator breaches white supremacist dating sites, exposes 8,000 users
An investigative journalist infiltrated three white supremacist platforms, including the dating site WhiteDate, exfiltrating over 8,000 user profiles and 100GB of sensitive data.
https://cybernews.com/security/investigator-exposes-white-supremacist-sites-users/
2
15
6
reposted by
Ján Trenčanský
ESET Research
5 months ago
In 2025,
#ESETresearch
analyzed hundreds of hands-on-keyboard ransomware attacks, mostly hitting manufacturing, construction, retail, technology, and healthcare. Most of these were seen in the US (17%), Spain (5%), and France, Italy, and Canada (4% each). 1/5
1
4
4
I can remember two incidents that involved PRNI. In both, the information received helped to contain the incident before ransomware was deployed. Disturbing to see damage to a clearly useful and actually working initiative.
add a skeleton here at some point
5 months ago
0
0
0
reposted by
Ján Trenčanský
Taggart
5 months ago
This is super good news: Docker Hardened Images are now available for free for all devs. These can form a much more secure baseline of your containerized apps.
loading . . .
Hardened Images for Everyone | Docker
Security for everyone. Docker Hardened Images are now free to use, share, and build on with no licensing surprises.
https://www.docker.com/blog/docker-hardened-images-for-every-developer/
0
7
6
reposted by
Ján Trenčanský
Eric Geller
5 months ago
Gotta say, I think Marcus makes an interesting point.
12
346
124
reposted by
Ján Trenčanský
Jake Williams
5 months ago
Why is Microsoft bundling Security Copilot licenses with E5? Clearly because they can't sell it as a standalone product. In other news, E5 costs will certainly go up "due to enhanced value."
www.darkreading.com/cybersecurit...
loading . . .
Microsoft to Bundle Security Copilot in M365 Enterprise License
The move aims to expand the use of Security Copilot and comes with the launch of 12 new agents from Microsoft at the company's Ignite conference last week.
https://www.darkreading.com/cybersecurity-operations/microsoft-bundle-security-copilot-m365-enterprise-license
9
40
12
reposted by
Ján Trenčanský
Kevin Beaumont
5 months ago
bless the heart of whoever posted this and thought it sounded good, lol
6
20
4
I always thought MITRE Enterprise Evals were for security solutions like EDRs. Imagine my surprise seeing Cyberani MDR in the results. MDR is a service, right? Even Cyberani says it's "more than a service". Didn’t Managed Services used to have their own Evals? Did I dream that?
5 months ago
1
2
0
The only thing you really need to know about this year’s MITRE ATT&CK Evaluations is that it had the lowest number of participating vendors ever. Only 11 vendors took part. The APT3 evaluation back in 2018 had 12.
5 months ago
0
0
0
I've built a lot of systems around Elasticsearch and can tell you this Intellexa backend has really shit mapping just based on the screenshots. I'd be embarrassed to show this to the customer.
securitylab.amnesty.org/latest/2025/...
loading . . .
To Catch a Predator: Leak exposes the internal operations of Intellexa’s mercenary spyware - Amnesty International Security Lab
Drawing on leaked internal company documents, sales and marketing material, as well as training videos, the “Intellexa Leaks” investigation gives a never-before-seen glimpse of the internal operations...
https://securitylab.amnesty.org/latest/2025/12/intellexa-leaks-predator-spyware-operations-exposed/
6 months ago
0
1
0
reposted by
Ján Trenčanský
ESET Research
6 months ago
#ESETresearch
is heading to
#AVAR2025
? Dec 4, Thursday in Kuala Lumpur, 11:00–11:30 MYT. ESET researchers Anton Cherepanov & Peter Strýček present: "Sniffing Around: Unmasking the LongNosedGoblin operation in Southeast Asia and Japan”. 1/3
1
3
3
Things must be going really well for Cobalt Strike if they’re advertising on …checks notes… Reddit.
6 months ago
0
2
0
reposted by
Ján Trenčanský
Jeremy Kirk
6 months ago
Anthropic's AI cyberespionage report feels as odd as the last one. Just 13 pages, it has none of the traditional components of a usual threat intel report (IoCs, payload hashes, etc.) and it seems to bury the lead re: technical sophistication. I wonder if a target will come forward.
#infosec
1
29
17
reposted by
Ján Trenčanský
Kevin Beaumont
6 months ago
This is spot on. Quantum’s gonna be the next cyber grift (again), after the bottom falls out of GenAI.
www.linkedin.com/posts/nathan...
7
96
26
reposted by
Ján Trenčanský
Max Böck
6 months ago
Short Answer: Fuck no. Long Answer: If a company tries AI phrenology in their hiring process, they're guaranteed to do worse things once you work there. Don't.
add a skeleton here at some point
1
56
16
I'm glad that, until next year, I don't have to be aware of cybersecurity anymore.
7 months ago
0
0
0
reposted by
Ján Trenčanský
Cian
7 months ago
LUCASARTS PRESENTS Columbo in: SCUMM of the Earth
#pixelart
add a skeleton here at some point
58
6261
2302
Saw some cool glowing rocks last week. My brain: These must be delicious.
7 months ago
0
1
0
reposted by
Ján Trenčanský
Pwnallthethings
7 months ago
Omg, the solution to CIA's Kryptos being discovered by someone becoming a subject matter expert, going on location, and finding the plaintext sitting in a vault several miles away is the absolute *perfect* ending to Kryptos. You couldn't write it. Just absolutely A+
www.nytimes.com/2025/10/16/s...
loading . . .
A C.I.A. Secret Kept for 35 Years Is Found in the Smithsonian’s Vault
https://www.nytimes.com/2025/10/16/science/kryptos-cia-solution-sanborn-auction.html
26
963
261
Load more
feeds!
log in