Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware
Reverse Engineering, Malware Analysis, APT, Samples
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17518
posts in
31.0
ms
Malware in an Open-Source Project Could Have
Infected
Thousands. The Twist? It Was Certified by
Delve
🦀
Offensive Rust
inc.com
·
6d
·
…
Another
worrying
macOS
malware
scheme has been discovered
👻
Rootkits
techradar.com
·
2d
·
…
GitHub Used as
Covert
Channel in Multi-Stage
Malware
Campaign
💥
Exploit Dev
infosecurity-magazine.com
·
1h
·
…
How
GhostClaw
exploits
macOS and OpenClaw to steal developer credentials
💥
Exploit Dev
bdtechtalks.substack.com
·
2d
·
Substack
·
…
Why Signature Based Detection is
Mathematically
Obsolete
🔍
Detection Engineering
github.com
·
6d
·
DEV
·
…
Trellix
Stinger
Portable 13.0.0.632 (common virus remover) Released
🪟
ETW Patching
portableapps.com
·
2d
·
…
AI Agents Act a Lot Like
Malware
. Here’s How to
Contain
the Risks.
🛡️
AI Security
oodaloop.com
·
2d
·
…
Infiniti Stealer: a new macOS
infostealer
using
ClickFix
and Python/Nuitka
🪟
ETW Patching
malware.news
·
6d
·
…
Malware
Isn’t the Threat — It’s the Business Model Behind It
🦠
Malware Analysis
medium.com
·
5d
·
…
Three Malware in One:
XWorm
, a Custom
Stealer
, and an Unknown RAT
🪝
COM Hijacking
medium.com
·
5d
·
…
The Close Relationship Between Telegram Bots and Threat Actors: New
Stealers
, Hunters Becoming the
Hunted
🍯
Deception Technology
cti.monster
·
3d
·
…
My minute-by-minute response to the
LiteLLM
malware
attack
🔓
Vulnerability Research
simonwillison.net
·
6d
·
…
New Venom
Stealer
MaaS
Platform Automates Continuous Data Theft
🦈
Wireshark
infosecurity-magazine.com
·
1d
·
…
How the
telnyx
PyPI package was compromised - malware hidden inside
WAV
audio files
🐍
Impacket
pwn.guide
·
4d
·
r/Python
,
r/netsec
·
…
What Virus
Databases
Reveal About the Future of Cyber
Warfare
🦠
Malware Analysis
medium.com
·
5d
·
…
TrustConnect
: Malware
Overview
🔐
Zero Trust
medium.com
·
3d
·
…
PyPI
Compromised: Malicious Code in `
telnyx
` Packages Leads to Credential Theft and Malware Installation
🐍
Impacket
dev.to
·
6d
·
DEV
·
…
Huge numbers of web
stores
are facing attack from this dangerous new
malware
🦠
Malware Analysis
techradar.com
·
6d
·
…
800,000 WordPress Sites Affected by
Arbitrary
File Read Vulnerability in Smart
Slider
3 WordPress Plugin
🔍
Binary Diffing
malware.news
·
6d
·
…
[Control systems]
ABB
security advisory (
AV26-286
)
🚧
Execution Guardrails
malware.news
·
6d
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help