Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Ransomware, Trojans, Dynamic Analysis, Sandbox Testing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187129
posts in
24.2
ms
eDySec
: A Deep Learning-based Explainable Dynamic Analysis Framework for Detecting Malicious Packages in
PyPI
Ecosystem
⚙️
MLOps
arxiv.org
·
21h
Malware
Analysis:
payloadfinal.bin
(Agent Tesla)
🔐
Hardware Security
infosecwriteups.com
·
4d
VECT
: Ransomware by design,
Wiper
by accident
🔐
Hardware Security
malware.news
·
2d
Rapid7
Discovers
“Post-Quantum” Ransomware Strain
🔐
Hardware Security
iansresearch.com
·
2h
VECT
2.0 Ransomware
Irreversibly
Destroys Files Over 131KB on Windows, Linux, ESXi
🔐
Hardware Security
thehackernews.com
·
2d
CySecurity
News - Latest Information Security and Hacking Incidents: Security Researchers Uncover
QEMU-Powered
Evasion in Payouts King Ransomware
🔐
Hardware Security
cysecurity.news
·
19h
·
Blogger
Ransomware is getting
uglier
as
cybercriminals
fake leaks and skip encryption entirely
🔐
Hardware Security
nerds.xyz
·
3d
·
r/Malware
Threat Intelligence Report:
IRGC-Affiliated
OT/IoT Malware Evolution
🔒
Cybersecurity
krypt3ia.wordpress.com
·
10h
Researchers unearth industrial sabotage malware that
predated
Stuxnet
by 5 years
🔐
Hardware Security
csoonline.com
·
1d
Inside
Vect
Ransomware-as-a-Service
🔐
Hardware Security
levelblue.com
·
10h
How a Poisoned Security Scanner Became the Key to
Backdooring
LiteLLM
🐛
Fuzzing
snyk.io
·
1d
Trigona
ransomware adopts custom tool to steal data and
evade
detection
🔐
Hardware Security
securityaffairs.com
·
4d
Cybercrime investigations in practice: Insights from the
LockerGoga
ransomware attack on
Norsk
Hydro
🔒
Cybersecurity
sciencedirect.com
·
1d
IT Security Weekend
Catch
Up
🔐
Hardware Security
badcyber.com
·
5d
The Malware Factory:
GLASSWORM
Forensics in Open
VSX
🔐
Hardware Security
blog.yeethsecurity.com
·
1d
·
r/Malware
rfxn/linux-malware-detect
v2.0.1
🐛
Fuzzing
github.com
·
1d
Gardening
Malware: When Code Becomes
Canvas
🔒
Cybersecurity
southpole.blog
·
3d
Source code
sandboxing
🐛
Fuzzing
kristaps.bsd.lv
·
1d
·
r/programming
Reverse Engineering With AI
Unearths
High-Severity
GitHub Bug (4 minute read)
🐛
Fuzzing
darkreading.com
·
1d
Payoutsking
Ransomware
Attack on I****G
🔒
Cybersecurity
malware.news
·
1h
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help