Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
malware, ransomware, trojan, sandbox analysis, threat intel
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187423
posts in
21.4
ms
Malware
Analysis:
payloadfinal.bin
(Agent Tesla)
🐧
Kernel Exploitation
infosecwriteups.com
·
5d
eDySec
: A Deep Learning-based Explainable Dynamic Analysis Framework for Detecting Malicious Packages in
PyPI
Ecosystem
💾
Binary Analysis
arxiv.org
·
23h
PayoutsKing
Ransomware Attack on
Kichler
Lighting
🐧
Kernel Exploitation
malware.news
·
3h
Full Disclosure:
Trojan-Spy.Win32.Small
🐧
Kernel Exploitation
seclists.org
·
1d
Cybercrime investigations in practice: Insights from the
LockerGoga
ransomware attack on
Norsk
Hydro
🛡️
Vulnerability Research
sciencedirect.com
·
1d
EtherRAT
Distribution Spoofing Administrative Tools via GitHub
Facades
🐧
Kernel Exploitation
thehackernews.com
·
15h
Rapid7
Discovers
“Post-Quantum” Ransomware Strain
⚡
JIT Exploitation
iansresearch.com
·
4h
Ransomware is getting
uglier
as
cybercriminals
fake leaks and skip encryption entirely
🐧
Kernel Exploitation
nerds.xyz
·
3d
·
r/Malware
How a Poisoned Security Scanner Became the Key to
Backdooring
LiteLLM
🛡️
Exploit Mitigations
snyk.io
·
1d
Threat Intelligence Report:
IRGC-Affiliated
OT/IoT Malware Evolution
📟
Firmware Analysis
krypt3ia.wordpress.com
·
12h
NSA
networking tool
poses
threat to national security
🐧
Kernel Exploitation
sdxcentral.com
·
15h
·
Hacker News
CVE MCP Server Turns Claude Into a Fully
Capable
Security Analyst With 27 Tools Across 21
APIs
⚡
JIT Exploitation
share.google
·
1h
Over 2.8 billion
credentials
stolen in 2025 as ransomware
evolves
🐧
Kernel Exploitation
betanews.com
·
1d
Gardening
Malware: When Code Becomes
Canvas
⚡
JIT Exploitation
southpole.blog
·
3d
Fast16
Malware
🛡️
Exploit Mitigations
schneier.com
·
17h
Researchers unearth industrial sabotage malware that
predated
Stuxnet
by 5 years
⚡
JIT Exploitation
csoonline.com
·
1d
CySecurity
News - Latest Information Security and Hacking Incidents: Security Researchers Uncover
QEMU-Powered
Evasion in Payouts King Ransomware
🐧
Kernel Exploitation
cysecurity.news
·
21h
·
Blogger
IT Security Weekend
Catch
Up
📟
Firmware Analysis
badcyber.com
·
5d
rfxn/linux-malware-detect
v2.0.1
🛡️
Exploit Mitigations
github.com
·
1d
Trend Micro
Maximum
Security review: Better alternatives
exist
🔌
Hardware Security
pcworld.com
·
12h
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help