Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
malware
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
WP Malware Sentinel: Signature-Based Scanning That Scales With the Threat Landscape
victorstackAI
victorstackAI
victorstackAI
Follow
Mar 17
WP Malware Sentinel: Signature-Based Scanning That Scales With the Threat Landscape
#
wordpress
#
drupal
#
security
#
malware
1
 reaction
Comments
Add Comment
4 min read
Operation Epic Fury: the Iranian C2 nobody found (0/94 VT, RDTSC sandbox evasion, 8 months pre-op)
Paolo Costanzo
Paolo Costanzo
Paolo Costanzo
Follow
Mar 17
Operation Epic Fury: the Iranian C2 nobody found (0/94 VT, RDTSC sandbox evasion, 8 months pre-op)
#
security
#
threatintel
#
osint
#
malware
Comments
Add Comment
2 min read
Update: pecheck.py Version 0.7.20
Mark0
Mark0
Mark0
Follow
Mar 13
Update: pecheck.py Version 0.7.20
#
cybersecurity
#
infosec
#
malware
#
tools
1
 reaction
Comments
Add Comment
1 min read
Zombie ZIP Vulnerability Enables Malware to Bypass 95% of Antivirus Software, Requiring Urgent Security Updates
Olga Larionova
Olga Larionova
Olga Larionova
Follow
Mar 13
Zombie ZIP Vulnerability Enables Malware to Bypass 95% of Antivirus Software, Requiring Urgent Security Updates
#
cybersecurity
#
malware
#
vulnerability
#
antivirus
Comments
Add Comment
8 min read
Agent.BTZ — how one USB stick rewrote modern cyber defence
HelixCipher
HelixCipher
HelixCipher
Follow
Mar 14
Agent.BTZ — how one USB stick rewrote modern cyber defence
#
cybersecurity
#
supplychainsecurity
#
airgap
#
malware
1
 reaction
Comments
Add Comment
2 min read
OpenClaw npm Malware: Fake Package Deploys GhostLoader RAT
Daniel Samer
Daniel Samer
Daniel Samer
Follow
Mar 16
OpenClaw npm Malware: Fake Package Deploys GhostLoader RAT
#
security
#
npm
#
openclaw
#
malware
1
 reaction
Comments
Add Comment
2 min read
Detecting and Mitigating Unauthorized Surveillance: Strategies to Protect Personal Devices from State and Non-State Actors
Denis Lavrentyev
Denis Lavrentyev
Denis Lavrentyev
Follow
Mar 16
Detecting and Mitigating Unauthorized Surveillance: Strategies to Protect Personal Devices from State and Non-State Actors
#
surveillance
#
cybersecurity
#
iot
#
malware
1
 reaction
Comments
Add Comment
13 min read
VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain
JP Dias
JP Dias
JP Dias
Follow
Mar 17
VoicePress5: Tracing a Phishing-to-Java RAT Infection Chain
#
phishing
#
malware
#
rat
#
infosec
Comments
Add Comment
10 min read
Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Mar 2
Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT
#
malware
#
security
#
powershell
#
gaming
Comments
Add Comment
2 min read
ScarCruft Ruby Jumper: How North Korean Hackers Breach Air-Gapped Networks via USB and Zoho WorkDrive in 2026
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Feb 27
ScarCruft Ruby Jumper: How North Korean Hackers Breach Air-Gapped Networks via USB and Zoho WorkDrive in 2026
#
scarcruft
#
apt37
#
airgapped
#
malware
Comments
Add Comment
4 min read
RESURGE Malware: CISA Warns It May Be Dormant on Your Ivanti Devices Right Now (CVE-2025-0282)
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Feb 27
RESURGE Malware: CISA Warns It May Be Dormant on Your Ivanti Devices Right Now (CVE-2025-0282)
#
ivanti
#
malware
#
cisa
#
cybersecurity
1
 reaction
Comments
Add Comment
4 min read
Aeternum C2: The Botnet That Lives on the Polygon Blockchain
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Feb 27
Aeternum C2: The Botnet That Lives on the Polygon Blockchain
#
botnet
#
blockchain
#
cybersecurity
#
malware
Comments
Add Comment
3 min read
Dohdoor Malware: New Backdoor Targets U.S. Education & Healthcare (UAT-10027)
DeepSeaX
DeepSeaX
DeepSeaX
Follow
Feb 26
Dohdoor Malware: New Backdoor Targets U.S. Education & Healthcare (UAT-10027)
#
malware
#
cybersecurity
#
threathunting
#
cobaltstrike
Comments
Add Comment
4 min read
Self-Mutating AI Malware — Why Traditional Antivirus Is Dead
Tiamat
Tiamat
Tiamat
Follow
Mar 9
Self-Mutating AI Malware — Why Traditional Antivirus Is Dead
#
security
#
ai
#
malware
#
detection
Comments
Add Comment
4 min read
AI-Generated Exploit Code — When LLMs Become Weaponized Attack Engines
Tiamat
Tiamat
Tiamat
Follow
Mar 10
AI-Generated Exploit Code — When LLMs Become Weaponized Attack Engines
#
security
#
ai
#
cybersecurity
#
malware
Comments
Add Comment
6 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account