Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware
Reverse Engineering, Malware Analysis, APT, Samples
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
17789
posts in
26.0
ms
They thought they were
downloading
Claude Code source. They got a
nasty
dose of malware instead
🦀
Offensive Rust
theregister.com
·
4h
·
…
The Close Relationship Between Telegram Bots and Threat Actors: New
Stealers
, Hunters Becoming the
Hunted
🍯
Deception Technology
cti.monster
·
3d
·
…
'By replacing a
legitimate
update with a malicious one, they turned the product’s update flow into a malware distribution channel': Experts find flaw in
TrueCon
...
💥
Exploit Dev
techradar.com
·
7h
·
…
How
GhostClaw
exploits
macOS and OpenClaw to steal developer credentials
💥
Exploit Dev
bdtechtalks.substack.com
·
2d
·
Substack
·
…
GitHub Used as
Covert
Channel in Multi-Stage
Malware
Campaign
💥
Exploit Dev
infosecurity-magazine.com
·
9h
·
…
Trellix
Stinger
Portable 13.0.0.632 (common virus remover) Released
🪟
ETW Patching
portableapps.com
·
2d
·
…
Why Signature Based Detection is
Mathematically
Obsolete
🔍
Detection Engineering
github.com
·
6d
·
DEV
·
…
Malware
Isn’t the Threat — It’s the Business Model Behind It
🦠
Malware Analysis
medium.com
·
5d
·
…
Three Malware in One:
XWorm
, a Custom
Stealer
, and an Unknown RAT
🪝
COM Hijacking
medium.com
·
5d
·
…
My minute-by-minute response to the
LiteLLM
malware
attack
🔓
Vulnerability Research
simonwillison.net
·
6d
·
…
How the
telnyx
PyPI package was compromised - malware hidden inside
WAV
audio files
🐍
Impacket
pwn.guide
·
4d
·
r/Python
,
r/netsec
·
…
What Virus
Databases
Reveal About the Future of Cyber
Warfare
🦠
Malware Analysis
medium.com
·
5d
·
…
New Venom
Stealer
MaaS
Platform Automates Continuous Data Theft
🦈
Wireshark
infosecurity-magazine.com
·
1d
·
…
TrustConnect
: Malware
Overview
🔐
Zero Trust
medium.com
·
3d
·
…
AI Agents Act a Lot Like
Malware
. Here’s How to
Contain
the Risks.
🛡️
AI Security
oodaloop.com
·
3d
·
…
'This
rootkit
is highly persistent; a standard factory reset will not remove it': "
NoVoice
" Android malware on Google Play infects 50 apps across 2.3 million de...
👻
Rootkits
techradar.com
·
5h
·
…
PyPI
Compromised: Malicious Code in `
telnyx
` Packages Leads to Credential Theft and Malware Installation
🐍
Impacket
dev.to
·
6d
·
DEV
·
…
Reverse
engineering Apple’s silent security
fixes
🚧
Execution Guardrails
malware.news
·
6d
·
…
Another
worrying
macOS
malware
scheme has been discovered
👻
Rootkits
techradar.com
·
3d
·
…
GitHub developers targeted by fake VS Code
alerts
spreading
malware
💥
Exploit Dev
techradar.com
·
3d
·
…
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help