DEV Community

# malware

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
WP Malware Sentinel: Signature-Based Scanning That Scales With the Threat Landscape

WP Malware Sentinel: Signature-Based Scanning That Scales With the Threat Landscape

1
Comments
4 min read
Operation Epic Fury: the Iranian C2 nobody found (0/94 VT, RDTSC sandbox evasion, 8 months pre-op)

Operation Epic Fury: the Iranian C2 nobody found (0/94 VT, RDTSC sandbox evasion, 8 months pre-op)

Comments
2 min read
Update: pecheck.py Version 0.7.20

Update: pecheck.py Version 0.7.20

1
Comments
1 min read
Zombie ZIP Vulnerability Enables Malware to Bypass 95% of Antivirus Software, Requiring Urgent Security Updates

Zombie ZIP Vulnerability Enables Malware to Bypass 95% of Antivirus Software, Requiring Urgent Security Updates

Comments
8 min read
Agent.BTZ — how one USB stick rewrote modern cyber defence

Agent.BTZ — how one USB stick rewrote modern cyber defence

1
Comments
2 min read
OpenClaw npm Malware: Fake Package Deploys GhostLoader RAT

OpenClaw npm Malware: Fake Package Deploys GhostLoader RAT

1
Comments
2 min read
Detecting and Mitigating Unauthorized Surveillance: Strategies to Protect Personal Devices from State and Non-State Actors

Detecting and Mitigating Unauthorized Surveillance: Strategies to Protect Personal Devices from State and Non-State Actors

1
Comments
13 min read
VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain

VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain

Comments
10 min read
Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT

Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT

Comments
2 min read
ScarCruft Ruby Jumper: How North Korean Hackers Breach Air-Gapped Networks via USB and Zoho WorkDrive in 2026

ScarCruft Ruby Jumper: How North Korean Hackers Breach Air-Gapped Networks via USB and Zoho WorkDrive in 2026

Comments
4 min read
RESURGE Malware: CISA Warns It May Be Dormant on Your Ivanti Devices Right Now (CVE-2025-0282)

RESURGE Malware: CISA Warns It May Be Dormant on Your Ivanti Devices Right Now (CVE-2025-0282)

1
Comments
4 min read
Aeternum C2: The Botnet That Lives on the Polygon Blockchain

Aeternum C2: The Botnet That Lives on the Polygon Blockchain

Comments
3 min read
Dohdoor Malware: New Backdoor Targets U.S. Education & Healthcare (UAT-10027)

Dohdoor Malware: New Backdoor Targets U.S. Education & Healthcare (UAT-10027)

Comments
4 min read
Self-Mutating AI Malware — Why Traditional Antivirus Is Dead

Self-Mutating AI Malware — Why Traditional Antivirus Is Dead

Comments
4 min read
AI-Generated Exploit Code — When LLMs Become Weaponized Attack Engines

AI-Generated Exploit Code — When LLMs Become Weaponized Attack Engines

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.