About a year ago, we publicly released the Yomi Hunter sandbox for a few simple reasons: in Yoroi we believe in the InfoSec community value, we think it plays a central role in the fight of cyber-threats and we feel the need to support it.
Our sentiment regarding the InfoSec community led us to support the Italian CTF team in their path to the final round of the European Cyber Security Challenge tournament last year. But, we also love to create things, so we were the first Italian Private Company launching and maintaining a public instance of the sandbox technology we developed across the years.
It was natural for us to try to give back something to the community we believe in, concretely.
Today, we’d love to challenge the malware community with the first “Yomi Hunting” contest. Literally, a malware and threat hunting contest with a simple and straightforward goal: hunt the bad guys.
So we are inviting malware analysts, security professionals and community researchers to feed the Yomi boxes with good malware, to stay in touch with the Yoroi twitter account to work with us and the other good guys.
Of course, as every contest, “Yomi Hunting” has some cool prizes too, such as the possibility of the publication of a joint malware research with our Z-LAB, along with awards and other fun stuff we will ship to the most active researchers participating in the contest.
It’s quite simple: Just go to the Yomi Hunter registration page, create a free community account, submit interesting samples and get in touch with us on our socials and share your findings! Or just include the “#yomihunter” hashtag to your tweets.
The contest will start on 17 February 2020 and will end on 31 March 2020. At the end of the contest the three most active researchers submitting more samples will be rewarded with:
Every participant can monitor the chart through the Yomi Hunter “Wall of Fame” here.
Happy Hunting!
| [adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Yomi)
[adrotate banner=”5″]
[adrotate banner=”13″]
Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…
A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…
A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…
Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…
Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…
This website uses cookies.