Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
malware, ransomware, trojan, sandbox analysis, threat intel
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186651
posts in
21.8
ms
The Malware Factory:
GLASSWORM
Forensics in Open
VSX
🛡️
Exploit Mitigations
blog.yeethsecurity.com
·
2d
·
r/Malware
Shai-Hulud
Themed Malware Found in the PyTorch Lightning AI Training Library
⚡
JIT Exploitation
semgrep.dev
·
12h
·
Hacker News
Fast16
:
Pre-Stuxnet
malware that targeted precision engineering software
🐧
Kernel Exploitation
securityaffairs.com
·
3d
NSA
Testing Anthropic’s
Mythos
to Find Flaws in Microsoft Tech
🛡️
Vulnerability Research
bloomberg.com
·
14h
CISA
flags data-theft bug in
NSA-built
OT networking tool
🐧
Kernel Exploitation
theregister.com
·
1d
Sandhills
Medical Says Ransomware Breach
Affects
170,000
🛡️
Vulnerability Research
securityweek.com
·
19h
VECT
: Ransomware by design,
Wiper
by accident
🐧
Kernel Exploitation
research.checkpoint.com
·
2d
Payoutsking
Ransomware
Attack on I****G
🐧
Kernel Exploitation
malware.news
·
4h
The
calm
before the
ransomware
storm: What you see is not all there is
🛡️
Vulnerability Research
welivesecurity.com
·
6d
Risky Business #835 -- Why the
Fast16
malware is
badass
📟
Firmware Analysis
risky.biz
·
1d
Building an Android App Analysis
Lab
on Ubuntu: A
Practical
Setup Guide
📟
Firmware Analysis
infosecwriteups.com
·
23h
The
npm
Threat Landscape: Attack Surface and
Mitigations
🛡️
Exploit Mitigations
unit42.paloaltonetworks.com
·
6d
Ransomware Turf War as
0APT
and
KryBit
Groups Trade Blows
🐧
Kernel Exploitation
infosecurity-magazine.com
·
2d
Over 2.8 billion
credentials
stolen in 2025 as ransomware
evolves
🐧
Kernel Exploitation
betanews.com
·
1d
SeqShield
: A Behavioral Analysis Approach to Uncover
Rootkits
💾
Binary Analysis
arxiv.org
·
3d
VECT
2.0 Ransomware
Irreversibly
Destroys Files Over 131KB on Windows, Linux, ESXi
🐧
Kernel Exploitation
thehackernews.com
·
2d
Trigona
ransomware adopts custom tool to steal data and
evade
detection
🐧
Kernel Exploitation
securityaffairs.com
·
4d
Ten-minute
Xp
Internet Attack:
Unsupported
Windows Becomes Instant Malware Target
🐧
Kernel Exploitation
windowsforum.com
·
1d
5
Stages
of The Threat Intelligence
Lifecycle
🎯
Taint Analysis
socradar.io
·
2d
27th April – Threat Intelligence Report
🛡️
Vulnerability Research
research.checkpoint.com
·
3d
« Page 1
·
Page 3 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help