Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🦠 Malware Analysis
Ransomware, Trojans, Dynamic Analysis, Sandbox Testing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
231
posts in
11.5
ms
MalwarePT
: A
Binary-Level
Foundation Model for Malware
Analysis
⚙️
MLOps
arxiv.org
·
2d
April 2026 CVE Landscape
🔒
Cybersecurity
malware.news
·
5d
Tracking TamperedChef Clusters via Certificate and
Code
Reuse
🔐
Hardware Security
unit42.paloaltonetworks.com
·
18h
Coruna Respawned: Compromised art-template npm Package Leads to iOS Browser
Exploit
Kit
🔐
Hardware Security
socket.dev
·
5h
Benchmarking LLMs for
malware
triage and
static
unpacking with Malcat
📊
LLM Evaluation
malcat.fr
·
2d
·
r/Malware
comnetac.exe: Dissecting a Multi-Stage .NET Dropper Delivering njRAT 0.7d
⚙️
MLOps
medium.com
·
4d
Mini Shai Hulud: Compromised @antv npm packages enable CI/CD credential theft
📁
Dotfiles
microsoft.com
·
10h
NixOS might be the best thing for
sandboxed
testing
stuff!
🐛
Fuzzing
youtu.be
·
1d
·
r/NixOS
Score by Collisions, Patch by Panic
🐛
Fuzzing
blog.himanshuanand.com
·
15h
·
Hacker News
April 2026 CVE Landscape
🔒
Network Security
recordedfuture.com
·
6d
Hackers bypass SonicWall VPN MFA due to incomplete patching
🔒
Network Security
bleepingcomputer.com
·
6h
InfoSec News Nuggets 05/18/2026 - AboutDFIR - The Definitive Compendium Project
🔒
Cybersecurity
aboutdfir.com
·
2d
Introducing Bitsight
Beacon
™: Supply Chain Exposure Management for the SOC
🔐
Hardware Security
bitsight.com
·
5h
gouravnagar-infosec/ai-kill-chain: A defender-side extension of the Lockheed Martin Cyber Kill Chain for LLM and agentic AI threats. Adds a model supply chain stage and splits actions-on-objectives into
exfiltration
, model extraction, and agentic pivot.
🛡️
AI Security
github.com
·
22h
·
Hacker News
Anatomy of a WooCommerce Skimmer: A Technical Deep-Dive
🔐
Hardware Security
scotthelme.co.uk
·
5d
·
Hacker News
CySecurity News - Latest Information Security and Hacking Incidents:
Trojanized
DAEMON Tools Used to Deploy Persistent Backdoor
Malware
🔒
Cybersecurity
cysecurity.news
·
2d
·
Blogger
Why some security fixes never reach your vulnerability dashboard
🐛
Fuzzing
csoonline.com
·
19h
PureLogs infostealer is stealing credentials worldwide
🔐
Hardware Security
helpnetsecurity.com
·
1d
Webworm Deploys EchoCreep and GraphWorm Backdoors Using Discord and MS Graph API
🔒
Network Security
thehackernews.com
·
15h
NEWS ROUNDUP
🔒
Cybersecurity
digitalforensicsmagazine.com
·
2d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help