Forem

# malware

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Islands of Invariance

Islands of Invariance

Comments
1 min read
Someone Built Android Malware That Asks Google's AI How to Survive. It Worked.

Someone Built Android Malware That Asks Google's AI How to Survive. It Worked.

Comments
3 min read
Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT

Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT

Comments
2 min read
ScarCruft Ruby Jumper: How North Korean Hackers Breach Air-Gapped Networks via USB and Zoho WorkDrive in 2026

ScarCruft Ruby Jumper: How North Korean Hackers Breach Air-Gapped Networks via USB and Zoho WorkDrive in 2026

Comments
4 min read
RESURGE Malware: CISA Warns It May Be Dormant on Your Ivanti Devices Right Now (CVE-2025-0282)

RESURGE Malware: CISA Warns It May Be Dormant on Your Ivanti Devices Right Now (CVE-2025-0282)

1
Comments
4 min read
Aeternum C2: The Botnet That Lives on the Polygon Blockchain

Aeternum C2: The Botnet That Lives on the Polygon Blockchain

Comments
3 min read
Dohdoor Malware: New Backdoor Targets U.S. Education & Healthcare (UAT-10027)

Dohdoor Malware: New Backdoor Targets U.S. Education & Healthcare (UAT-10027)

Comments
4 min read
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets

Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets

Comments
1 min read
SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook

SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook

1
Comments
1 min read
Malicious Go Module Impersonates crypto Library to Deploy Rekoobe Backdoor

Malicious Go Module Impersonates crypto Library to Deploy Rekoobe Backdoor

1
Comments
3 min read
Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool
Cover image for Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Comments
5 min read
DynoWiper update: Technical analysis and attribution

DynoWiper update: Technical analysis and attribution

Comments
1 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

Comments
1 min read
Dissecting Digital Viruses: My First Steps in Malware Analysis
Cover image for Dissecting Digital Viruses: My First Steps in Malware Analysis

Dissecting Digital Viruses: My First Steps in Malware Analysis

Comments
2 min read
Lab 01: Where It All Begins — Static Analysis of 4 Malware Samples
Cover image for Lab 01: Where It All Begins — Static Analysis of 4 Malware Samples

Lab 01: Where It All Begins — Static Analysis of 4 Malware Samples

Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.