Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
malware, ransomware, trojan, sandbox analysis, threat intel
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
186693
posts in
24.9
ms
Reverse
Engineering & Hardware
Hacking
🔄
Reverse Engineering
malware.news
·
7h
Don't pay
Vect
a
ransom
- your data's likely already wiped out
🐧
Kernel Exploitation
theregister.com
·
2d
From
QR
to Threat
Identification
in one Click
🎲
Fuzzing
bakerstreetforensics.com
·
5d
This New Ransomware Is So Broken It
Permanently
Destroys Your Files Instead of
Encrypting
Them
🐧
Kernel Exploitation
hothardware.com
·
1d
Building an Android App Analysis
Lab
on Ubuntu: A
Practical
Setup Guide
📟
Firmware Analysis
infosecwriteups.com
·
1d
Trigona
ransomware attacks use custom
exfiltration
tool to steal data
🐧
Kernel Exploitation
sh.itjust.works
·
6d
Reverse Engineering With AI
Unearths
High-Severity
GitHub Bug (4 minute read)
⚡
JIT Exploitation
darkreading.com
·
1d
STIX
Visualizer
— Threat Intelligence Graph Explorer
🔒
CFI
cyber.netsecops.io
·
6d
·
r/netsec
CySecurity News - Latest Information Security and Hacking Incidents:
ShinyHunters
Targets
McGraw
Hill In Salesforce Data Leak Dispute Over Breach Scope
🐧
Kernel Exploitation
cysecurity.news
·
2d
·
Blogger
New ransomware
wipes
every file larger than 128
KB
🐧
Kernel Exploitation
mashable.com
·
1d
OCR
Announces
Settlements
of Four Ransomware Investigations that Affected Over 427,000 Individuals
🛡️
Vulnerability Research
databreaches.net
·
6d
Vect
ransomware actually destructive
wiper
malware
🛡️
Exploit Mitigations
computerweekly.com
·
2d
Claude
Mythos
Preview
Requires
New Ways to Keep Code Secure
🛡️
Exploit Mitigations
spectrum.ieee.org
·
3d
threatdeck
🛡️
Exploit Mitigations
terminaltrove.com
·
2d
Release Notes:
Expanded
Threat Intelligence Access, AI Assisted Search 1,770 New
Detections
and More
📟
Firmware Analysis
malware.news
·
17h
Source code
sandboxing
💾
Binary Analysis
kristaps.bsd.lv
·
1d
·
r/programming
UNC6692
Hackers
Exploit
Microsoft Teams to Deploy SNOW Malware
🐧
Kernel Exploitation
hackread.com
·
3d
Researchers Uncover 73 Fake VS Code Extensions
Delivering
GlassWorm
v2 Malware
⚡
JIT Exploitation
sh.itjust.works
·
2d
Critical Flaw Turns
Vect
Ransomware into Data Destroying
Wiper
🛡️
Exploit Mitigations
infosecurity-magazine.com
·
1d
TeamPCP
Hijacks Bitwarden CLI, Uses
Dependabot
to Deploy Shai-Hulud Malware
⚡
JIT Exploitation
hackread.com
·
6d
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help