Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🦠 Malware Analysis
malware, ransomware, trojans, threat analysis
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
187313
posts in
18.6
ms
Claude
Mythos
Preview
Requires
New Ways to Keep Code Secure
🕵️
Threat Intelligence
spectrum.ieee.org
·
3d
Threat intelligence
Oski
Lab
🕵️
Threat Intelligence
medium.com
·
6d
China-Linked APT
GopherWhisper
Abuses
Legitimate
Services in Government Attacks
💥
Cyberattack
securityweek.com
·
5d
TeamPCP
Hijacks Bitwarden CLI, Uses
Dependabot
to Deploy Shai-Hulud Malware
💥
Exploit Development
hackread.com
·
6d
Natural
Contacts
,
gardening
malware
🎭
Social Engineering
neural.it
·
6d
Payload
Ransomware Strikes
PROM
in Poland
🔬
Security Research
malware.news
·
3h
UNC6692
Hackers
Exploit
Microsoft Teams to Deploy SNOW Malware
🕵️
Hacking
hackread.com
·
3d
AsmRAG
: LLM-Driven Malware Detection by Retrieving
Functionally
Similar Assembly Code
🐛
Fuzzing
arxiv.org
·
2d
Reverse
Engineering & Hardware
Hacking
🔧
Hardware Hacking
malware.news
·
5h
GopherWhisper
: new China-linked APT targets
Mongolia
with Go-based malware
💥
Cyberattack
securityaffairs.com
·
4d
SeqShield
: A Behavioral Analysis Approach to Uncover
Rootkits
📱
Mobile Security
arxiv.org
·
2d
My
RAG
Pipeline Was 84%
Confident
💿
software
github.com
·
5d
·
DEV
Cyber-Enabled
Strategic Cargo Theft
Surging
💥
Cyber Attacks
malware.news
·
12h
Release Notes:
Expanded
Threat Intelligence Access, AI Assisted Search 1,770 New
Detections
and More
🕵️
Threat Intelligence
malware.news
·
15h
Detecting Avalanche Effect in Adversarial Settings:
Spotting
the Encryption
Loops
in Ransomware
🔐
Cryptography
arxiv.org
·
2d
SECURITY
AFFAIRS
MALWARE
NEWSLETTER ROUND 94
🔬
Security Research
securityaffairs.com
·
4d
Payoutsking
Ransomware Targets Italian Firm
Sofinter
S.p.a
💥
Cyberattack
malware.news
·
3h
Advanced
Anomaly
Detection and Threat Intelligence in Zero Trust
IoT
Environments Using Machine Learning
🕵️
Threat Intelligence
arxiv.org
·
2d
Qilin
Ransomware Strikes
Eduporium
, Business Services Sector at Risk
💥
Cyberattack
malware.news
·
3h
GNU
security advisory (
AV26-407
)
📡
Network Security
malware.news
·
12h
Sign up or log in to see more results
Sign Up
Login
« Page 2
Log in to enable infinite scrolling
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help