Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Behavioral Analysis, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
76553
posts in
903.2
ms
💀 Modern
Malware
’s
Anti-Forensics
dev.to
·
1d
·
Discuss:
DEV
🔍
Digital Forensics
Novel
Technique
to
Detect
Cloud Threat Actor Operations
unit42.paloaltonetworks.com
·
18h
🦅
Falco
I've
abandoned
third-party
antivirus
and I'm never looking back
howtogeek.com
·
2h
🔒
Security
Samsar4/Ethical-Hacking-Labs
: Practical
Ethical
Hacking Labs 🗡🛡
github.com
·
1d
🛡️
Cybersecurity
Live System Analysis: Mitigating
Interference
from
Antivirus
Tools
blog.elcomsoft.com
·
1d
🔍
eBPF
The Engagement Trap: 45
Adversarial
Patterns in Modern AI
Assistants
pastebin.com
·
1d
·
Discuss:
Hacker News
🛡️
AI Security
Detecting and
Explaining
Malware Family Evolution Using Rule-Based
Drift
Analysis
arxiv.org
·
3d
🧠
Machine Learning
December 2025–January 2026 Detection Highlights: New
VTIs
, 65+ YARA rules, and More Config
Extractors
vmray.com
·
1d
🔐
Hardware Security
Microsoft unveils method to detect
sleeper
agent
backdoors
artificialintelligence-news.com
·
2d
🛡️
AI Security
The silent DNS malware that’s
redefining
email and web-based
cyberattacks
techradar.com
·
1d
🔌
gRPC Interceptors
DYNOWIPER
:
Destructive
Malware Targeting Poland's Energy Sector
elastic.co
·
1d
🔍
eBPF
Everyone Says AI Is
Insecure
, So I
Measured
It
hackernoon.com
·
7h
🛡️
AI Security
**Abstract:** This paper introduces a novel methodology for automated
geochemical
anomaly detection within volcanic rock suites using a multi-modal data
inge
...
freederia.com
·
1d
🎯
Qdrant
17% of 3rd-Party
Add-Ons
for
OpenClaw
Used in Crypto Theft and macOS Malware
hackread.com
·
1d
🔐
Hardware Security
CySecurity News - Latest Information Security and Hacking Incidents: Unsecured Database Exposes 149 Million
Logins
Linked to
Infostealer
Malware Operations
cysecurity.news
·
2h
·
Discuss:
Blogger
🔒
Security
19
Shades
of
LockBit
5.0, Inside the Latest Cross-Platform Ransomware: Part 3
levelblue.com
·
1d
🔐
Hardware Security
Weekly
OSINT
Review 2026.06
osintamy.medium.com
·
23h
🔍
Digital Forensics
DKnife
Linux toolkit has been used since 2019 to
hijack
router traffic at the edge-device level to spy, deliver malware in espionage campaigns.
bleepingcomputer.com
·
19h
·
Discuss:
r/technews
🔍
eBPF
Three
Investigative
Bottlenecks
– Three New Baseline Capabilities
forensicfocus.com
·
1d
🔍
Digital Forensics
Unsupervised
Learning NO. 515
newsletter.danielmiessler.com
·
9h
💬
Prompt Engineering
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help