Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Behavioral Analysis, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
22687
posts in
15.1
ms
Investigating a Malware Hash Using
AlienVault
OTX
and Creating a YARA Detection Rule
medium.com
·
23h
🦠
Malware
Your AI Copilot Might Be
Poisoned
: RAG Attacks and Why
Static
Analysis Still Wins
dev.to
·
2h
·
Discuss:
DEV
🛡️
AI Security
Six Android Malware Families Target
Pix
Payments, Banking Apps, and Crypto
Wallets
thehackernews.com
·
21h
🎯
Threat Modeling
Inside a USB Malware Investigation: How Digital
Forensics
Uncovered Hidden
Executables
milindasenaka96.medium.com
·
4d
🔍
Digital Forensics
The Red
Queen
’s Race:
Arms
Race Dynamics in Threat Detection
malware.news
·
2d
🔎
threat hunting
14,000
routers
are infected by malware that's highly resistant to
takedowns
arstechnica.com
·
1d
·
Discuss:
Hacker News
🔒
Network Security
Building the
Future-Proofing
Forensics Pipeline with
Dilithium
dzone.com
·
1d
🔐
Post-Quantum Crypto
I built a free Threat Intelligence API in
Python/Flask
– ML-based IP
reputation
scoring
rapidapi.com
·
14h
·
Discuss:
DEV
🎯
Threat Intelligence
CyberDefenders
Write-Up:
Yellow
RAT — Malware Threat Intelligence Investigation
medium.com
·
2d
🎯
Threat Intel
How to Scale Phishing Detection in Your
SOC
: 3 Steps for
CISOs
thehackernews.com
·
16h
🎯
Threat Intelligence
Hackers
hijack
WordPress sites to spread malware using fake
CAPTCHA
techradar.com
·
1d
🍯
Deception Technology
Navigating 2026’s
Converged
Threats: Insights from
Flashpoint
’s Global Threat Intelligence Report
flashpoint.io
·
1d
🎯
Threat Intelligence
Fake job applications pack malware that kills
EDR
before
stealing
data
theregister.com
·
2d
🦠
Malware
Iranian APT
MuddyWater
Uses
Dindoor
Malware to Target U.S. Networks
socradar.io
·
3d
🔒
Cybersecurity
LIA Implements
Malcat
Kesakode
for Payload Identification
malware.news
·
2d
🦠
Malware
How I
Replaced
LLM-Based Code Analysis with
Static
Analysis
dev.to
·
2h
·
Discuss:
DEV
🔍
Static Analysis
Investigating
multi-vector
attacks in Log
Explorer
blog.cloudflare.com
·
2d
🦈
Wireshark
This dangerous
malware
is written in Visual Basic 6.0, and costs less than a PS5 game — but
poses
a very real threat to your business
techradar.com
·
3d
🦠
Malware
New solution
uses
AI to spot file-based
threats
betanews.com
·
2d
🎯
Threat Intelligence
FreeBSD
Capsicum
vs. Linux
Seccomp
Process Sandboxing
vivianvoss.net
·
3d
·
Discuss:
Hacker News
,
r/programming
📦
Sandboxing
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help