Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Behavioral Analysis, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
75899
posts in
900.2
ms
💀 Modern
Malware
’s
Anti-Forensics
dev.to
·
2d
·
Discuss:
DEV
🔍
Digital Forensics
Using AI Agents to
Analyze
Malware on
REMnux
zeltser.com
·
1d
📡
SonarQube
OSINT
2025: New and updated digital
investigative
tools of the year
indicator.media
·
2h
🔍
Digital Forensics
Novel
Technique
to
Detect
Cloud Threat Actor Operations
unit42.paloaltonetworks.com
·
1d
🦅
Falco
DKnife
toolkit abuses
routers
to spy and deliver malware since 2019
securityaffairs.com
·
58m
🔐
Hardware Security
LeakWatch
2026 – Security
incidents
, data leaks, and IT
incidents
in the current calendar week 6
igorslab.de
·
6h
🌐
Network Security
I've
abandoned
third-party
antivirus
and I'm never looking back
howtogeek.com
·
19h
🔒
Security
Live System Analysis: Mitigating
Interference
from
Antivirus
Tools
blog.elcomsoft.com
·
1d
🔍
eBPF
Everyone Says AI Is
Insecure
, So I
Measured
It
hackernoon.com
·
1d
🛡️
AI Security
December 2025–January 2026 Detection Highlights: New
VTIs
, 65+ YARA rules, and More Config
Extractors
vmray.com
·
2d
🔐
Hardware Security
Detecting and
Explaining
Malware Family Evolution Using Rule-Based
Drift
Analysis
arxiv.org
·
4d
🧠
Machine Learning
Microsoft unveils method to detect
sleeper
agent
backdoors
artificialintelligence-news.com
·
3d
🛡️
AI Security
DYNOWIPER
:
Destructive
Malware Targeting Poland's Energy Sector
elastic.co
·
2d
🔍
eBPF
Financial
OSINT
: Guide to
tracing
corporate assets & networks
spotlight.ebu.ch
·
1h
🔍
Digital Forensics
Securing
IoT devices: why
passwords
are not enough
iotinsider.com
·
2h
🔒
Security
**Abstract:** This paper introduces a novel methodology for automated
geochemical
anomaly detection within volcanic rock suites using a multi-modal data
inge
...
freederia.com
·
2d
🎯
Qdrant
The methodology behind the LLM contamination paper getting
sustained
cloning
adversarialbaseline.substack.com
·
2d
·
Discuss:
Substack
🛡️
AI Security
CySecurity
News - Latest Information Security and Hacking Incidents: Dozens of Government and Infrastructure Networks
Breached
in Global Espionage Campaign
cysecurity.news
·
16h
·
Discuss:
Blogger
🛡️
Cybersecurity
The silent DNS malware that’s
redefining
email and web-based
cyberattacks
techradar.com
·
1d
🔌
gRPC Interceptors
17% of 3rd-Party
Add-Ons
for
OpenClaw
Used in Crypto Theft and macOS Malware
hackread.com
·
1d
🔐
Hardware Security
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help