Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Ransomware, Trojans, Dynamic Analysis, Sandbox Testing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
150877
posts in
22.2
ms
🔍 Inside My
Malware
Analysis Lab:
Static
& Dynamic Analysis in Action
🐛
Fuzzing
medium.com
·
3d
The long road to your crypto:
ClipBanker
and its marathon
infection
chain
🔒
Cybersecurity
securelist.com
·
1d
CySecurity
News - Latest Information Security and Hacking Incidents: New Chaos Malware Variant Expands to Cloud Targets, Introduces Proxy
Capability
🔒
Cybersecurity
cysecurity.news
·
21h
·
Blogger
Supply chain attack at
CPUID
pushes malware with
CPU-Z/HWMonitor
🔐
Hardware Security
bleepingcomputer.com
·
2h
·
Hacker News
Atomic Stealer (AMOS) macOS Malware
Decryption
, Anti-VM, Hardware Wallet
Trojanization
& Persistent Backdoor
🔐
Hardware Security
iru.com
·
2d
·
r/Malware
Renovate
&
Dependabot
: The New Malware Delivery System
🐛
Fuzzing
blog.gitguardian.com
·
7h
·
r/netsec
Miolab
Stealer
: Malware Overview
🔐
Hardware Security
medium.com
·
4d
Android
APK
Analysis Tool: AI-Powered
Static
Malware Analysis in Your Terminal
🔐
Hardware Security
infosecwriteups.com
·
2d
HarshithReddy01/redos-analyzer
: Static analysis tool that detects and automatically fixes
ReDoS
vulnerabilities in Python using sre_parse AST analysis.
🐛
Fuzzing
github.com
·
2d
·
Hacker News
Malware in
Proprietary
Software - Latest Additions by Rob
Musial
🔐
Hardware Security
techrights.org
·
6d
Can Drift-Adaptive Malware
Detectors
Be Made Robust? Attacks and
Defenses
Under White-Box and Black-Box Threats
🐛
Fuzzing
arxiv.org
·
1d
Global Law Enforcement Breakthrough:
REvil
Ransomware
Leader Identified
🔒
Network Security
medium.com
·
3d
Spoofed
IT Tools Distribute
EtherRAT
in Highly Stealthy Campaign Suspected Linked to DPRK APT
🔐
Hardware Security
medium.com
·
2d
'Stolen session cookies render MFA
irrelevant
': How $900-per-month
turnkey
malware is putting enterprise-grade account hijacking in the hands of rookie hackers
🔐
Hardware Security
techradar.com
·
2d
DomainTools
Investigations | DPRK Malware
Modularity
: Diversity and Functional Specialization
🔒
Cybersecurity
dti.domaintools.com
·
4d
·
Hacker News
Hackers
Pose
as Non-Profit Developers to Deploy
Monero
Mining Malware
🔐
Hardware Security
hackread.com
·
2d
From Malware and Exploits to Apps and
Identities
: How the Browser Became the
Battleground
🔒
Cybersecurity
guidepointsecurity.com
·
2d
Qilin
and
Warlock
Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
🔐
Hardware Security
thehackernews.com
·
4d
Middle East Hack-for-Hire Operation
Traced
to South Asian Cyber
Espionage
Group
🔒
Cybersecurity
infosecurity-magazine.com
·
1d
Can a attack start without
Malware
: A small use-case by
CrowdStrike
in 2026
🛡️
AI Security
medium.com
·
4d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help