#malware_analysis search results
Assembly language for malware analysis workshop at #x33fcon 2023 delivered by @vishUwell - #malware #malware_analysis #assembly
#Malware_analysis 1⃣ Using Syscall() for Obfuscation/Fileless Activity isc.sans.edu/diary/Using+Sy… 2⃣ Odyssey Stealer and AMOS Campaign hunt.io/blog/macos-ody… 3⃣ TikTok Videos Promoting Malware Installation isc.sans.edu/diary/TikTok%2…
#reversing #Research #Malware_analysis "Code Modularity as a Heuristic for Malware Design", Nov. 2025. ]-> All YARA signatures used in this research - github.com/l3fdb33f/modul… // This research investigates whether modularity and plugin-based architecture can serve as a static…
#Malware_analysis 1. SleepyDuck malware secureannex.com/blog/sleepyduc… 2. Leveraging GenAI to Reverse Engineer XLoader research.checkpoint.com/2025/generativ… 3. MH-1M: A 1.34 Million-Sample Comprehensive Multi-Feature Android Malware Dataset for ML, Deep Learning, LLMs, and Threat Intelligence…
🔵this key stages of #Malware_Analysis discovery can help businesses stay protected: 1⃣Static Analysis.🔍 2⃣Dynamic Analysis.💻 3⃣Code Analysis.🧠 4⃣Behavioral Analysis.📊 Stay one step ahead of cyber threats with StackDeans' expertise.💼🛡️ DM now 📥 #StackDeans #CyberDeans
#Malware_analysis 1⃣ SesameOp backdoor microsoft.com/en-us/security… 2⃣ LANDFALL Android Spyware unit42.paloaltonetworks.com/landfall-is-ne… 3⃣ DragonForce ransomware-as-a-service acronis.com/en/tru/posts/t… 4⃣ LeakyInjector and LeakyStealer Duo hybrid-analysis.blogspot.com/2025/11/leakyi… 5⃣ Ransomvibing in VS Code…
#Malware_analysis 1. Modus Operandi of Subtle Snail catalyst.prodaft.com/public/report/… 2. Prompts as Code & Embedded Keys: The Hunt for LLM-Enabled Malware sentinelone.com/labs/prompts-a… 3. More Fun With WMI specterops.io/blog/2025/09/1…
#Malware_analysis 1. Datzbro RAT threatfabric.com/blogs/datzbro-… 2. Detecting DLL hijacking with ML: real-world cases securelist.com/detecting-dll-… 3. Mustang Panda Publoader 0x0d4y.blog/mustang-panda-… 4. FunkSec’s FunkLocker: How AI Is Powering the Next Wave of Ransomware any.run/cybersecurity-……
Is Linux-based Malware Analysis rare or getting be better attention last days.🤔 It's so exciting 😁 #Linux_Malware_Analysis #Malware_Analysis #ELF_file_analysis
#Kernel_Security #Malware_analysis 1⃣ BombShell: The Signed Backdoor Hiding in Plain Sight on Framework Devices eclypsium.com/blog/bombshell… 2⃣ Singularity: Deep Dive into a Modern Stealth Linux Kernel Rootkit blog.kyntra.io/Singularity-A-… ]-> Full Source Code - github.com/MatheuZSecurit… 3⃣…
#Malware_analysis 1. OtterCandy, malware used by WaterPlum jp.security.ntt/insights_resou… 2. Tracking Malware and Attack Expansion: A Hacker Group’s Journey across Asia fortinet.com/blog/threat-re… 3. Lessons from the BlackBasta Ransomware Attack on Capita blog.bushidotoken.net/2025/10/lesson… 4.…
#Threat_Research #Malware_analysis 1. Analyzing the latest updates to XCSSET’s inventory microsoft.com/en-us/security… 2. Analysis of Qilin ransomware using an optional encryption algorithm asec.ahnlab.com/ko/90360 3. How AI-Native Development Platforms Enable Fake Captcha Pages…
#Malware_analysis 1⃣ Earth Estries/Salt Typhoon bartblaze.blogspot.com/2025/10/earth-… 2⃣ A Deep Dive Into Warlock Ransomware Deployed Via ToolShell SharePoint Chained Vulnerabilities hybrid-analysis.blogspot.com/2025/10/a-deep… 3⃣ 10 npm Typosquatted Packages Deploy Multi-Stage Credential Harvester…
#reversing #Research #Malware_analysis "Code Modularity as a Heuristic for Malware Design", Nov. 2025. ]-> All YARA signatures used in this research - github.com/l3fdb33f/modul… // This research investigates whether modularity and plugin-based architecture can serve as a static…
#Malware_analysis 1⃣ SesameOp backdoor microsoft.com/en-us/security… 2⃣ LANDFALL Android Spyware unit42.paloaltonetworks.com/landfall-is-ne… 3⃣ DragonForce ransomware-as-a-service acronis.com/en/tru/posts/t… 4⃣ LeakyInjector and LeakyStealer Duo hybrid-analysis.blogspot.com/2025/11/leakyi… 5⃣ Ransomvibing in VS Code…
#Malware_analysis 1⃣ SesameOp backdoor microsoft.com/en-us/security… 2⃣ LANDFALL Android Spyware unit42.paloaltonetworks.com/landfall-is-ne… 3⃣ DragonForce ransomware-as-a-service acronis.com/en/tru/posts/t… 4⃣ LeakyInjector and LeakyStealer Duo hybrid-analysis.blogspot.com/2025/11/leakyi… 5⃣ Ransomvibing in VS Code…
#Malware_analysis 1. SleepyDuck malware secureannex.com/blog/sleepyduc… 2. Leveraging GenAI to Reverse Engineer XLoader research.checkpoint.com/2025/generativ… 3. MH-1M: A 1.34 Million-Sample Comprehensive Multi-Feature Android Malware Dataset for ML, Deep Learning, LLMs, and Threat Intelligence…
#Malware_analysis 1⃣ Earth Estries/Salt Typhoon bartblaze.blogspot.com/2025/10/earth-… 2⃣ A Deep Dive Into Warlock Ransomware Deployed Via ToolShell SharePoint Chained Vulnerabilities hybrid-analysis.blogspot.com/2025/10/a-deep… 3⃣ 10 npm Typosquatted Packages Deploy Multi-Stage Credential Harvester…
#Malware_analysis 1⃣ LockBit 5.0 («ChuongDong») blog.checkpoint.com/research/lockb… 2⃣ Baohuo Android backdoor news.drweb.com/show/?i=15076 3⃣ Unpacking NetSupport RAT Loaders Delivered via ClickFix esentire.com/blog/unpacking… 4⃣ Fakeupdate injector + Phoenix Backdoor group-ib.com/blog/muddywate… 5⃣…
#Malware_analysis 1⃣ LockBit 5.0 («ChuongDong») blog.checkpoint.com/research/lockb… 2⃣ Baohuo Android backdoor news.drweb.com/show/?i=15076 3⃣ Unpacking NetSupport RAT Loaders Delivered via ClickFix esentire.com/blog/unpacking… 4⃣ Fakeupdate injector + Phoenix Backdoor group-ib.com/blog/muddywate… 5⃣…
#Malware_analysis 1⃣ Vidar Stealer 2.0 trendmicro.com/en_us/research… 2⃣ Malicious NuGet packages socket.dev/blog/malicious… 3⃣ Caminho LaaS arcticwolf.com/resources/blog…
#Malware_analysis 1⃣ Vidar Stealer 2.0 trendmicro.com/en_us/research… 2⃣ Malicious NuGet packages socket.dev/blog/malicious… 3⃣ Caminho LaaS arcticwolf.com/resources/blog…
#Malware_analysis 1⃣ Using Syscall() for Obfuscation/Fileless Activity isc.sans.edu/diary/Using+Sy… 2⃣ Odyssey Stealer and AMOS Campaign hunt.io/blog/macos-ody… 3⃣ TikTok Videos Promoting Malware Installation isc.sans.edu/diary/TikTok%2…
#Malware_analysis 1. OtterCandy, malware used by WaterPlum jp.security.ntt/insights_resou… 2. Tracking Malware and Attack Expansion: A Hacker Group’s Journey across Asia fortinet.com/blog/threat-re… 3. Lessons from the BlackBasta Ransomware Attack on Capita blog.bushidotoken.net/2025/10/lesson… 4.…
#Malware_analysis 1. OtterCandy, malware used by WaterPlum jp.security.ntt/insights_resou… 2. Tracking Malware and Attack Expansion: A Hacker Group’s Journey across Asia fortinet.com/blog/threat-re… 3. Lessons from the BlackBasta Ransomware Attack on Capita blog.bushidotoken.net/2025/10/lesson… 4.…
#Kernel_Security #Malware_analysis 1⃣ BombShell: The Signed Backdoor Hiding in Plain Sight on Framework Devices eclypsium.com/blog/bombshell… 2⃣ Singularity: Deep Dive into a Modern Stealth Linux Kernel Rootkit blog.kyntra.io/Singularity-A-… ]-> Full Source Code - github.com/MatheuZSecurit… 3⃣…
#NetSec #Malware_analysis 1⃣ LinkPro: eBPF rootkit analysis synacktiv.com/en/publication… // LinkPro is a stealthy Linux rootkit utilizing eBPF and user-space techniques for covert process/file hiding, persistent C2, and targeted attacks on AWS for financial gain 2⃣ Defrosting…
#Malware_analysis 1. IAmAntimalware: Inject Malicious Code Into Antivirus zerosalarium.com/2025/10/IAmAnt… 2. "Beamglea" phishing campaign socket.dev/blog/175-malic… 3. Polymorphic Python Malware isc.sans.edu/diary/Polymorp…
#Malware_analysis 1. Datzbro RAT threatfabric.com/blogs/datzbro-… 2. Detecting DLL hijacking with ML: real-world cases securelist.com/detecting-dll-… 3. Mustang Panda Publoader 0x0d4y.blog/mustang-panda-… 4. FunkSec’s FunkLocker: How AI Is Powering the Next Wave of Ransomware any.run/cybersecurity-……
#Malware_analysis 1. WARMCOOKIE backdoor elastic.co/security-labs/… 2. BadIIS / ASP NET Web BackDoor blog.talosintelligence.com/uat-8099-chine… 3. SORVEPOTEL malware campaign trendmicro.com/en_gb/research… 4. Confucius Backdoor fortinet.com/blog/threat-re… 5. ProSpy Android spyware welivesecurity.com/en/eset-resear…
#Threat_Research #Malware_analysis 1. Analyzing the latest updates to XCSSET’s inventory microsoft.com/en-us/security… 2. Analysis of Qilin ransomware using an optional encryption algorithm asec.ahnlab.com/ko/90360 3. How AI-Native Development Platforms Enable Fake Captcha Pages…
#DFIR #tools #Malware_analysis 1. SANS ISC Script Collection github.com/clausing/scrip… ]-> New tool: convert-ts-bash-history.py // Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This tool…
#Malware_analysis 1. Bookworm malware family unit42.paloaltonetworks.com/bookworm-to-st… 2. "Line Dancer" malware implant blog.talosintelligence.com/arcanedoor-new… 3. Olymp Loader: Malware-as-a-Service outpost24.com/blog/olymp-loa… 4. New LockBit 5.0 trendmicro.com/en_us/research… 5. BRICKSTORM stealthy backdoor…
An old malware sample with code snippet that used for checking and infecting .exe file on USB Drive. #malware_analysis
Assembly language for malware analysis workshop at #x33fcon 2023 delivered by @vishUwell - #malware #malware_analysis #assembly
#Malware_analysis #Offensive_security LDAP Enumeration: Unveiling the Double-Edged Sword of Active Directory unit42.paloaltonetworks.com/lightweight-di…
Another #OceanLotus sample that targeted in Viet Nam virustotal.com/gui/file/92d76… #VinCSS #malware_analysis
#Malware_Analysis #Penetration_Testing #Certified_Information_Security_Manager #Network_Associate_Security #Network_Associate_Routing_And_Switching #Hacking_Forensic_Investigator #System_Security_Professional Phone:+91 8707307583 Email:[email protected]
r/t #DARKSURGEON - A Windows Packer Project To Empower Incident Response, Digital #Forensics, #Malware_Analysis, And Network Defense dlvr.it/QWGLkD
Powerful book 🤠🚀 Thanks @abhijit_mohanta , @AnoopSaldanha #malware_analysis #Reverse_engineering #Detection_engineering
How can you prepare yourself to be a Malware Analyst? Find the answer in this webinar by Eng. Amr Thabet: buff.ly/2TqzKSw Build your CV Now: buff.ly/36o3W3J #CyberTalents #Malware_Analysis #Cybersecurity #Infosec #Career #Hiring #Recruitment #Vacancies #Jobs
Something went wrong.
Something went wrong.
United States Trends
- 1. Northern Lights 32.1K posts
- 2. #DWTS 48.8K posts
- 3. #Aurora 6,549 posts
- 4. Justin Edwards 1,935 posts
- 5. Louisville 16.5K posts
- 6. Andy 59.6K posts
- 7. #RHOSLC 6,013 posts
- 8. #OlandriaxHarpersBazaar 4,135 posts
- 9. Lowe 12.3K posts
- 10. Oweh 1,941 posts
- 11. Creighton 1,779 posts
- 12. Kentucky 24.8K posts
- 13. Elaine 40K posts
- 14. JT Toppin N/A
- 15. Celtics 12K posts
- 16. Gonzaga 2,327 posts
- 17. #WWENXT 16.5K posts
- 18. Robert 98.4K posts
- 19. Dylan 30.4K posts
- 20. Jordan Walsh N/A