Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
malware, ransomware, trojans, threat analysis
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
149389
posts in
13.6
ms
🔍 Inside My
Malware
Analysis Lab:
Static
& Dynamic Analysis in Action
⚙️
Reverse Engineering
medium.com
·
2d
Evolution of
Ransomware
:
Multi-Extortion
Ransomware
Attacks
🔍
Digital Forensics
bleepingcomputer.com
·
6d
The long road to your crypto:
ClipBanker
and its marathon
infection
chain
🐛
Fuzzing
securelist.com
·
23h
Renovate
&
Dependabot
: The New Malware Delivery System
💥
Exploit Development
blog.gitguardian.com
·
1h
·
r/netsec
Android
APK
Analysis Tool: AI-Powered
Static
Malware Analysis in Your Terminal
📱
Mobile Security
infosecwriteups.com
·
2d
UAT-10362
Targets Taiwanese NGOs with
LucidRook
Malware in Spear-Phishing Campaigns
🔓
Penetration Testing
thehackernews.com
·
16h
Image or
Malware
? Read until the end and answer in
comments
:)
💥
Cyberattack
securityaffairs.com
·
5d
A
flood
of
useful
security reports
🔬
Security Research
lwn.net
·
19h
Can Drift-Adaptive Malware
Detectors
Be Made Robust? Attacks and
Defenses
Under White-Box and Black-Box Threats
🐛
Fuzzing
arxiv.org
·
1d
Weekly Threat Intelligence Report 6
Apr
2026
🔬
Security Research
medium.com
·
6h
Global Law Enforcement Breakthrough:
REvil
Ransomware
Leader Identified
🔬
Security Research
medium.com
·
2d
Malware in
Proprietary
Software - Latest Additions by Rob
Musial
🔧
Hardware Hacking
techrights.org
·
6d
CySecurity
News - Latest Information Security and Hacking Incidents: New Chaos Malware Variant Expands to Cloud Targets, Introduces Proxy
Capability
💥
Cyber Attacks
cysecurity.news
·
15h
·
Blogger
Atomic Stealer (AMOS) macOS Malware
Decryption
, Anti-VM, Hardware Wallet
Trojanization
& Persistent Backdoor
🔧
Hardware Hacking
iru.com
·
1d
·
r/Malware
Middle East Hack-for-Hire Operation
Traced
to South Asian Cyber
Espionage
Group
📱
Mobile Security
infosecurity-magazine.com
·
22h
DomainTools
Investigations | DPRK Malware
Modularity
: Diversity and Functional Specialization
🔴
Red Teaming
dti.domaintools.com
·
4d
·
Hacker News
HarshithReddy01/redos-analyzer
: Static analysis tool that detects and automatically fixes
ReDoS
vulnerabilities in Python using sre_parse AST analysis.
🐛
Fuzzing
github.com
·
2d
·
Hacker News
Ransomware attack on company that
manages
Dutch
hospitals
' patient files
💥
Cyberattack
nltimes.nl
·
2d
Threat Intelligence for
SOC
🕵️
Threat Intelligence
medium.com
·
5d
DNS Deep Dive:
LummaStealer
+
CastleLoader
= Larger Threat
🕵️
Threat Intelligence
circleid.com
·
2d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help