Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Ransomware, Trojans, Dynamic Analysis, Sandbox Testing
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186466
posts in
74.7
ms
Don't pay
Vect
a
ransom
- your data's likely already wiped out
🔒
Network Security
theregister.com
·
2d
Release Notes:
Expanded
Threat Intelligence Access, AI Assisted Search 1,770 New
Detections
and More
🔐
Hardware Security
malware.news
·
12h
How
UNC6692
Employed
Social Engineering to Deploy a Custom Malware Suite
🔒
Cybersecurity
sh.itjust.works
·
6d
EtherRAT
Distribution Spoofing Administrative Tools via GitHub
Facades
🔐
Hardware Security
thehackernews.com
·
12h
Risky Business #835 -- Why the
Fast16
malware is
badass
🔒
Cybersecurity
risky.biz
·
1d
Building an Android App Analysis
Lab
on Ubuntu: A
Practical
Setup Guide
🔍
OSINT
infosecwriteups.com
·
19h
Claude
Mythos
Preview
Requires
New Ways to Keep Code Secure
🛡️
AI Security
spectrum.ieee.org
·
3d
Vect
ransomware actually destructive
wiper
malware
🔐
Hardware Security
computerweekly.com
·
2d
Full Disclosure:
Trojan-Spy.Win32.Small
🔐
Hardware Security
seclists.org
·
1d
TeamPCP
Hijacks Bitwarden CLI, Uses
Dependabot
to Deploy Shai-Hulud Malware
🐛
Fuzzing
hackread.com
·
6d
Dozens of Open
VSX
Extension Clones Linked to
GlassWorm
Malware
🔐
Hardware Security
securityweek.com
·
2d
Scam-checking
just got a lot easier:
Malwarebytes
is now in Claude
🔐
Hardware Security
malwarebytes.com
·
1d
The
calm
before the
ransomware
storm: What you see is not all there is
🔒
Cybersecurity
welivesecurity.com
·
6d
Reverse
Engineering
SimTower
✍️
Prompt Engineering
phulin.me
·
1d
·
Hacker News
,
r/programming
Fast16
:
Pre-Stuxnet
malware that targeted precision engineering software
🔐
Hardware Security
securityaffairs.com
·
3d
Ransomware Turf War as
0APT
and
KryBit
Groups Trade Blows
🔐
Hardware Security
infosecurity-magazine.com
·
2d
Reverse
Engineering & Hardware
Hacking
🔐
Hardware Security
malware.news
·
2h
Over 2.8 billion
credentials
stolen in 2025 as ransomware
evolves
🔒
Network Security
betanews.com
·
1d
Trigona
ransomware attacks use custom
exfiltration
tool to steal data
🔒
Network Security
sh.itjust.works
·
6d
SeqShield
: A Behavioral Analysis Approach to Uncover
Rootkits
🐛
Fuzzing
arxiv.org
·
2d
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help