Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
malware
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Safely Handling Malware Samples for API Testing
Ionx Solutions
Ionx Solutions
Ionx Solutions
Follow
Apr 30
Safely Handling Malware Samples for API Testing
#
infosec
#
malware
#
tutorial
#
antivirus
Comments
Add Comment
20 min read
TAMECAT: APT42's New PowerShell Backdoor Targeting Military and Government Officials
Excalibra
Excalibra
Excalibra
Follow
Apr 28
TAMECAT: APT42's New PowerShell Backdoor Targeting Military and Government Officials
#
cybersecurity
#
apt
#
malware
#
powershell
5
 reactions
Comments
Add Comment
5 min read
Malware-Based Attacks: The Undying Threat of the Computer Virus
Peter Nasarah Dashe
Peter Nasarah Dashe
Peter Nasarah Dashe
Follow
Apr 14
Malware-Based Attacks: The Undying Threat of the Computer Virus
#
cybersecurity
#
malware
#
infosec
#
incidentresponse
Comments
Add Comment
5 min read
Tried to buy a pint, Finding a Trojan: My First Malware Analysis
Michael Parker
Michael Parker
Michael Parker
Follow
Apr 11
Tried to buy a pint, Finding a Trojan: My First Malware Analysis
#
discuss
#
cybersecurity
#
malware
#
cryptography
Comments
Add Comment
7 min read
A firefox extension .xpi malware scanner python script and live malware examples.
Maximilian Cornett
Maximilian Cornett
Maximilian Cornett
Follow
Apr 10
A firefox extension .xpi malware scanner python script and live malware examples.
#
malwareanalysis
#
malware
#
cybersecurity
#
firefox
Comments
Add Comment
1 min read
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack
Excalibra
Excalibra
Excalibra
Follow
Apr 13
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack
#
malware
#
vulnerabilities
#
redteam
#
cybersecurity
5
 reactions
Comments
Add Comment
6 min read
Malicious Code Hidden in Build Config Files Exploits Trust in PRs: Enhanced Scrutiny and Automated Checks Proposed
Pavel Kostromin
Pavel Kostromin
Pavel Kostromin
Follow
Apr 9
Malicious Code Hidden in Build Config Files Exploits Trust in PRs: Enhanced Scrutiny and Automated Checks Proposed
#
security
#
malware
#
opensource
#
obfuscation
Comments
Add Comment
11 min read
Malicious PyPI Package Squatting: AGPL-3.0 Violations and Reputation Attacks Addressed with Legal and Community Action
Roman Dubrovin
Roman Dubrovin
Roman Dubrovin
Follow
Apr 7
Malicious PyPI Package Squatting: AGPL-3.0 Violations and Reputation Attacks Addressed with Legal and Community Action
#
pypi
#
agpl30
#
malware
#
opensource
Comments
Add Comment
9 min read
That Fake Purchase Order in Your Inbox? It Might Be Formbook Stealing Every Keystroke You Type
THREAT CHAIN
THREAT CHAIN
THREAT CHAIN
Follow
Apr 7
That Fake Purchase Order in Your Inbox? It Might Be Formbook Stealing Every Keystroke You Type
#
security
#
malware
#
cybersecurity
#
formbook
Comments
Add Comment
6 min read
CVE-2026-34208: JavaScript Sandbox Library Can't Keep Attackers Out
THREAT CHAIN
THREAT CHAIN
THREAT CHAIN
Follow
Apr 7
CVE-2026-34208: JavaScript Sandbox Library Can't Keep Attackers Out
#
security
#
malware
#
cybersecurity
#
cve202634208
Comments
Add Comment
3 min read
Claude Code Source Leak: How One Packaging Mistake Created a Hacker Feeding Frenzy
THREAT CHAIN
THREAT CHAIN
THREAT CHAIN
Follow
Apr 6
Claude Code Source Leak: How One Packaging Mistake Created a Hacker Feeding Frenzy
#
security
#
malware
#
cybersecurity
#
supplychainattack
Comments
Add Comment
6 min read
Inside OffLoader: A GCleaner-Dropped Payload Slipping Past 95% of AV Engines
THREAT CHAIN
THREAT CHAIN
THREAT CHAIN
Follow
Apr 4
Inside OffLoader: A GCleaner-Dropped Payload Slipping Past 95% of AV Engines
#
security
#
malware
#
cybersecurity
#
offloader
Comments
Add Comment
7 min read
Malicious npm Packages Disguised as Strapi Plugins Enable Data Exfiltration and Remote Code Execution
Artyom Kornilov
Artyom Kornilov
Artyom Kornilov
Follow
Apr 4
Malicious npm Packages Disguised as Strapi Plugins Enable Data Exfiltration and Remote Code Execution
#
npm
#
strapi
#
malware
#
exfiltration
Comments
Add Comment
7 min read
A laughing RAT: CrystalX combines spyware, stealer, and prankware features
Mark0
Mark0
Mark0
Follow
Apr 2
A laughing RAT: CrystalX combines spyware, stealer, and prankware features
#
cybersecurity
#
infosec
#
malware
#
crystalx
Comments
Add Comment
1 min read
npm's Implicit Dependency Execution Exposes Users to Security Risks: Explicit Confirmation Needed
Marina Kovalchuk
Marina Kovalchuk
Marina Kovalchuk
Follow
Apr 1
npm's Implicit Dependency Execution Exposes Users to Security Risks: Explicit Confirmation Needed
#
npm
#
security
#
dependencies
#
malware
Comments
Add Comment
9 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account