Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
Sandboxing, Behavioral Analysis, Threat Intelligence, Forensics
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
135075
posts in
137.9
ms
Using LLM and
Ghidra
to
analyze
malware (Part 1)
discounttimu.substack.com
·
1d
·
Discuss:
Substack
🔍
eBPF
SECURITY
AFFAIRS
MALWARE
NEWSLETTER ROUND 89
securityaffairs.com
·
9h
📈
Prometheus
Weekly Intelligence Report – 20 March 2026 | #
ransomware
nationalcybersecurity.com
·
2d
🔒
Security
AI-based automated SQL query generation for
SQLite
databases in Mobile
forensics
sciencedirect.com
·
5h
📊
Vectorized Query Execution
Threat Intelligence Report:
MANGO
SANDSTORM
Indoor
krypt3ia.wordpress.com
·
2d
🛡️
Cybersecurity
VoidStealer
malware steals Chrome master key via
debugger
trick
bleepingcomputer.com
·
5h
🦅
Falco
Ploutus
Malware: Uptick in ATM
jackpotting
incidents prompts FBI warning
infosecwriteups.com
·
14h
🏷️
Memory Tagging
CySecurity News - Latest Information Security and Hacking Incidents: Stryker Hit by Major Cyberattack as
Hacktivist
Group Claims
Wiper
Malware Operation
cysecurity.news
·
2h
·
Discuss:
Blogger
🔍
Digital Forensics
MMO(Duet Night
Abyss
) compromised,
distributes
Open Source malware
youtube.com
·
1d
·
Discuss:
r/programming
🔓
Binary Exploitation
Google Threat Intelligence
Sounds
Alarm on Latest Crypto
Malware
Threat
cointelegraph.com
·
1d
🔓
Binary Exploitation
GlassWorm
malware
hides
in invisible open-source code
scientificamerican.com
·
1d
🔓
Binary Exploitation
We built
runtime
threat detection for AI agents — here's what we found after monitoring
1M
+ agent calls
dev.to
·
1d
·
Discuss:
DEV
🛡️
AI Security
Cohesity
embeds
Sophos
malware scanning in Data Cloud
techzine.eu
·
2d
🔗
Intrusive Containers
Analyzing
the Current State of AI Use in
Malware
unit42.paloaltonetworks.com
·
3d
🛡️
AI Security
Building a
Pipeline
for Agentic
Malware
Analysis
synthesis.to
·
4d
·
Discuss:
Hacker News
🚀
MLOps
Ethical
Hacking for Beginners — Day 2:
Viruses
, Malware, Cyber Attacks & Security Testing
osintteam.blog
·
2d
🛡️
Cybersecurity
New
Perseus
Android Banking Malware Monitors Notes Apps to
Extract
Sensitive Data
thehackernews.com
·
3d
📈
Perfetto
Ransomware
Backup Architecture: Designing Recovery Systems Against
Adversarial
Attacks
rack2cloud.com
·
1d
·
Discuss:
DEV
🔐
Capability Systems
The Art of
Self-Healing
Code:
Malware
that fixes itself
infosecwriteups.com
·
2d
🔓
Binary Exploitation
Assessing Endpoint Protection: Our Approach to
EDR/XDR
and Supplements Evaluation
insinuator.net
·
3d
🔍
Digital Forensics
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help