Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Reverse Engineering, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187234
posts in
19.7
ms
Malware
Analysis:
payloadfinal.bin
(Agent Tesla)
🔓
Binary Exploitation
infosecwriteups.com
·
4d
Reverse
Engineering & Hardware
Hacking
🔍
Reverse Engineering
malware.news
·
4h
AsmRAG
: LLM-Driven Malware Detection by Retrieving
Functionally
Similar Assembly Code
🔓
Binary Exploitation
arxiv.org
·
2d
EtherRAT
Distribution Spoofing Administrative Tools via GitHub
Facades
🔓
Binary Exploitation
thehackernews.com
·
15h
Researchers unearth industrial sabotage malware that
predated
Stuxnet
by 5 years
🔓
Binary Exploitation
csoonline.com
·
1d
Threat Intelligence Report:
IRGC-Affiliated
OT/IoT Malware Evolution
🔧
Microcontrollers
krypt3ia.wordpress.com
·
12h
IT Security Weekend
Catch
Up
🛡️
Security Research
badcyber.com
·
5d
How a Poisoned Security Scanner Became the Key to
Backdooring
LiteLLM
🔓
Binary Exploitation
snyk.io
·
1d
Techno
East 2026: Advancing The Future Of Digital
Forensics
🔒
Cybersecurity
forensicfocus.com
·
2d
Fast16
:
Pre-Stuxnet
malware that targeted precision engineering software
🔓
Binary Exploitation
securityaffairs.com
·
3d
Risky Business #835 -- Why the
Fast16
malware is
badass
🔓
Binary Exploitation
risky.biz
·
1d
Gardening
Malware: When Code Becomes
Canvas
🔓
Binary Exploitation
southpole.blog
·
3d
Cybercrime investigations in practice: Insights from the
LockerGoga
ransomware attack on
Norsk
Hydro
🛡️
Security Research
sciencedirect.com
·
1d
The Malware Factory:
GLASSWORM
Forensics in Open
VSX
🔓
Binary Exploitation
blog.yeethsecurity.com
·
1d
·
r/Malware
TeamPCP
Hijacks Bitwarden CLI, Uses
Dependabot
to Deploy Shai-Hulud Malware
🔓
Binary Exploitation
hackread.com
·
6d
VECT
: Ransomware by design,
Wiper
by accident
🔓
Binary Exploitation
research.checkpoint.com
·
2d
Full Disclosure:
Trojan-Spy.Win32.Small
🔓
Binary Exploitation
seclists.org
·
1d
Release Notes:
Expanded
Threat Intelligence Access, AI Assisted Search 1,770 New
Detections
and More
🛡️
Security Research
malware.news
·
14h
Ransomware is getting
uglier
as
cybercriminals
fake leaks and skip encryption entirely
🔓
Binary Exploitation
nerds.xyz
·
3d
·
r/Malware
Over 2.8 billion
credentials
stolen in 2025 as ransomware
evolves
🔒
Cybersecurity
betanews.com
·
1d
Page 2 »
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help