{"id":23895,"date":"2024-10-31T09:11:10","date_gmt":"2024-10-31T08:11:10","guid":{"rendered":"https:\/\/www.nextron-systems.com\/?p=23895"},"modified":"2025-01-29T15:37:33","modified_gmt":"2025-01-29T14:37:33","slug":"introducing-nextronresearch-a-new-channel-for-threat-intelligence","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/","title":{"rendered":"Introducing @NextronResearch: A New Channel for Threat Intelligence"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>As part of our commitment to sharing valuable threat intelligence and detection insights, we&#8217;re excited to announce the launch of a dedicated Twitter account for Nextron Research: <a rel=\"noopener\" target=\"_new\" href=\"https:\/\/twitter.com\/nextronresearch\"><span>@nextronresearch<\/span><\/a>. This account will be our team&#8217;s platform for sharing detailed findings, detection rules, and analyses of interesting samples that might be too niche or technical for general audiences.<\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/10\/Screenshot-2024-10-31-at-08.56.03.png&#8221; title_text=&#8221;Screenshot 2024-10-31 at 08.56.03&#8243; _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Why a Separate Account?<\/h3>\n<p>For some time, we&#8217;ve been sharing detection updates and sample insights from personal accounts and the <a href=\"https:\/\/x.com\/nextronsystems\">@nextronsystems<\/a> account, but we realized that this might be too much for followers who are more interested in general security discussions. By creating a dedicated space, we\u2019re able to focus on technical content without overwhelming those looking for a broader mix of topics.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>What to Expect<\/h3>\n<p>On <a rel=\"noopener\" target=\"_new\" href=\"https:\/\/twitter.com\/nextronresearch\"><span>@nextronresearch<\/span><\/a>, our team will regularly post about:<\/p>\n<ul>\n<li><strong>Detection rule updates<\/strong> \u2013 New or updated rules for identifying threats.<\/li>\n<li><strong>Sample analyses<\/strong> \u2013 Breakdowns of noteworthy malware samples.<\/li>\n<li><strong>Threat intelligence insights<\/strong> \u2013 Observations on emerging threats, TTPs, and more.<\/li>\n<\/ul>\n<p>This channel will be a direct line from our research team to you, giving you the latest on what we\u2019re working on and the threats we\u2019re tracking. And don\u2019t worry \u2014 key updates will still be shared on our personal accounts and retweeted here, so you won\u2019t miss anything crucial.<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.27.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h3>Join Us on This New Journey<\/h3>\n<p>If you\u2019re passionate about threat intelligence, malware analysis, and detection engineering follow us at <a rel=\"noopener\" target=\"_new\" href=\"https:\/\/twitter.com\/nextronresearch\"><span>@nextronresearch<\/span><\/a> to stay in the loop. We\u2019re looking forward to sharing our insights and engaging with the community in this dedicated space.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As part of our commitment to sharing valuable threat intelligence and detection insights, we&#8217;re excited to announce the launch of a dedicated Twitter account for Nextron Research: @nextronresearch. This account will be our team&#8217;s platform for sharing detailed findings, detection rules, and analyses of interesting samples that might be too niche or technical for general audiences.Why a Separate Account? For some time, we&#8217;ve been sharing detection updates and sample insights from personal accounts and the @nextronsystems account, but we realized that this might be too much for followers who are more interested in general security discussions. By creating a dedicated space, we\u2019re able to focus on technical content without overwhelming those looking for a broader mix of topics.What to Expect On @nextronresearch, our team will regularly post about: Detection rule updates \u2013 New or updated rules for identifying threats. Sample analyses \u2013 Breakdowns of noteworthy malware samples. Threat intelligence insights \u2013 Observations on emerging threats, TTPs, and more. This channel will be a direct line from our research team to you, giving you the latest on what we\u2019re working on and the threats we\u2019re tracking. And don\u2019t worry \u2014 key updates will still be shared on our personal accounts and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":23902,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[749,46,1,760,735],"tags":[768,124,186,767,132,101,764,766,48],"class_list":["post-23895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-homepage","category-newsletter","category-nextron","category-recommended","category-research","tag-findings","tag-malware","tag-nextron","tag-research","tag-samples","tag-signatures","tag-threat-research","tag-twitter","tag-yara"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Introducing @NextronResearch: A New Channel for Threat Intelligence - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Introducing @NextronResearch: A New Channel for Threat Intelligence\",\"datePublished\":\"2024-10-31T08:11:10+00:00\",\"dateModified\":\"2025-01-29T14:37:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/\"},\"wordCount\":441,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/10\/cyb3rops_futuristic_landscape_tron_style_circuit_boards_ones_an_df2c80ca-d4eb-401b-be02-db27f35c2da5.png\",\"keywords\":[\"findings\",\"malware\",\"nextron\",\"Research\",\"samples\",\"signatures\",\"threat research\",\"Twitter\",\"YARA\"],\"articleSection\":[\"Homepage\",\"Newsletter\",\"Nextron\",\"Recommended\",\"Research\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/\",\"name\":\"Introducing @NextronResearch: A New Channel for Threat Intelligence - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/10\/cyb3rops_futuristic_landscape_tron_style_circuit_boards_ones_an_df2c80ca-d4eb-401b-be02-db27f35c2da5.png\",\"datePublished\":\"2024-10-31T08:11:10+00:00\",\"dateModified\":\"2025-01-29T14:37:33+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/#primaryimage\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/10\/cyb3rops_futuristic_landscape_tron_style_circuit_boards_ones_an_df2c80ca-d4eb-401b-be02-db27f35c2da5.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/10\/cyb3rops_futuristic_landscape_tron_style_circuit_boards_ones_an_df2c80ca-d4eb-401b-be02-db27f35c2da5.png\",\"width\":1536,\"height\":768},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Introducing @NextronResearch: A New Channel for Threat Intelligence - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Introducing @NextronResearch: A New Channel for Threat Intelligence","datePublished":"2024-10-31T08:11:10+00:00","dateModified":"2025-01-29T14:37:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/"},"wordCount":441,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/10\/cyb3rops_futuristic_landscape_tron_style_circuit_boards_ones_an_df2c80ca-d4eb-401b-be02-db27f35c2da5.png","keywords":["findings","malware","nextron","Research","samples","signatures","threat research","Twitter","YARA"],"articleSection":["Homepage","Newsletter","Nextron","Recommended","Research"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/","url":"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/","name":"Introducing @NextronResearch: A New Channel for Threat Intelligence - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/10\/cyb3rops_futuristic_landscape_tron_style_circuit_boards_ones_an_df2c80ca-d4eb-401b-be02-db27f35c2da5.png","datePublished":"2024-10-31T08:11:10+00:00","dateModified":"2025-01-29T14:37:33+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/2024\/10\/31\/introducing-nextronresearch-a-new-channel-for-threat-intelligence\/#primaryimage","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/10\/cyb3rops_futuristic_landscape_tron_style_circuit_boards_ones_an_df2c80ca-d4eb-401b-be02-db27f35c2da5.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2024\/10\/cyb3rops_futuristic_landscape_tron_style_circuit_boards_ones_an_df2c80ca-d4eb-401b-be02-db27f35c2da5.png","width":1536,"height":768},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/23895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=23895"}],"version-history":[{"count":4,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/23895\/revisions"}],"predecessor-version":[{"id":23903,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/23895\/revisions\/23903"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media\/23902"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=23895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=23895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=23895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}