Articles by Tag #malware

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Hunting Coyote: A Full Analysis of the 0LIONW0 AutoIt3 RAT

0. Origin of the Story I found a USB at home. And I have no clue about it contains what. I...

Learn More 1 0Dec 3 '25

VM Safety Configuration: A Developer's Guide

Virtual machines are essential tools for testing untrusted code, analyzing malware, or experimenting...

Learn More 0 0Oct 16 '25

🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

I recently shipped a project I’m really proud of: MANTA – Malware Analysis Tool & Assistant It’s...

Learn More 0 0Nov 20 '25

When Malware Starts Prompt-Engineering Itself

Somewhere right now, there’s a sketchy little script on a compromised Windows box asking an AI model...

Learn More 0 0Dec 5 '25

Quantum-Aware Symbolic Defense System

🛡️ ROD: A Quantum-Aware Symbolic Defense System (How to Architect Ethical AI...

Learn More 0 0Oct 9 '25

AI vs. AI: How Google's 'PROMPTFLUX' Malware Rewrites Itself (And How 'Big Sleep' Fights Back)

We thought polymorphic malware was bad. Now, we're seeing something new: "Generative Malware" that...

Learn More 0 0Nov 10 '25

Malware analysis - Hancitor Loader

Stage 1 In our case is very simple, so let's quickly run through it. From the import table, we can...

Learn More 0 0Nov 3 '25

How I Removed Persistent Adware Pop-Ups from Android Phone Without a Factory Reset

A practical, step-by-step guide to diagnose and remove hidden Android adware using ADB—without losing your data.

Learn More 0 0Oct 21 '25

I wanted to know how malware works, so I built an analyser

Lessons from designing a reproducible, interpretable static malware analysis pipeline for my Master’s thesis.

Learn More 0 0Dec 10 '25

Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets

Researchers have discovered a sophisticated Android backdoor named Keenadu, which compromises devices...

Learn More 0 0Feb 18

4 Essential Security Steps for Your WordPress Website

Website security is more important than ever. With the increasing number of hacking and malware...

Learn More 0 0Nov 28 '25

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

This report details a VIP Recovery malware infection identified on January 20, 2026, which...

Learn More 0 0Jan 30

SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook

⚠️ Region Alert: UAE/Middle East Recent geopolitical escalations between Iran, the United States,...

Learn More 1 0Mar 3

Cloud-Native Threat Detection: Deploying YARA for Scalable Malware Detection in EKS

YARA is a powerful tool used for pattern matching in files, primarily for malware detection and...

Learn More 0 0Apr 13 '25

Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

The Security Operations Center is on high alert. A critical server is exhibiting strange network...

Learn More 0 0Sep 26 '25

Lab 01: Where It All Begins — Static Analysis of 4 Malware Samples

Part 1 of the Practical Malware Analysis Labs Series Introduction Static analysis means...

Learn More 0 0Jan 6

OpenClaw Skill Malware Audit: 341 Malicious Skills Infecting ClawHub

TL;DR ClawHub, OpenClaw's official skill marketplace, is a malware distribution platform....

Learn More 0 0Mar 8

First Steps into Darkness: My First Malware Analysis Experience

First step into the dark realm is the hardest to take, it starts with pure blindness, but slowly...

Learn More 0 0Oct 7 '25

DynoWiper update: Technical analysis and attribution

ESET researchers have released a technical analysis of DynoWiper, a new data-wiping malware recently...

Learn More 0 0Feb 2

Malicious Go Module Impersonates crypto Library to Deploy Rekoobe Backdoor

A Supply Chain Attack Hiding in Plain Sight A malicious Go module named...

Learn More 1 0Feb 28

The Trojan Horse Job Offer - How a Hacked LinkedIn Profile & Stolen Project Delivered Malware

A Web3 job offer via a HACKED (but legitimate-looking) LinkedIn account led to a GitHub repo for a STOLEN project. The backend contained malware designed to steal data and install a backdoor.

Learn More 4 2May 28 '25

Dissecting Digital Viruses: My First Steps in Malware Analysis

Ever wondered what a virus actually does under the hood? Here is how I started reversing malware safely and what I've learned.

Learn More 0 0Jan 20

Dohdoor Malware: New Backdoor Targets U.S. Education & Healthcare (UAT-10027)

Executive Summary Threat Actor: UAT-10027 (low-confidence North Korea nexus, overlaps...

Learn More 0 0Feb 26

Self-Mutating AI Malware — Why Traditional Antivirus Is Dead

TL;DR Cybercriminals are using AI to build malware that mutates during execution, adapts...

Learn More 0 0Mar 9

Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT

The Threat Microsoft Threat Intelligence has issued a warning about a campaign targeting...

Learn More 0 0Mar 2

Aeternum C2: The Botnet That Lives on the Polygon Blockchain

Qrator Research Lab has uncovered Aeternum — a native C++ botnet loader that uses the Polygon...

Learn More 0 0Feb 27

RESURGE Malware: CISA Warns It May Be Dormant on Your Ivanti Devices Right Now (CVE-2025-0282)

CISA just updated its malware analysis report on RESURGE — and the finding is alarming: this implant...

Learn More 1 0Feb 27

ScarCruft Ruby Jumper: How North Korean Hackers Breach Air-Gapped Networks via USB and Zoho WorkDrive in 2026

North Korea's ScarCruft (APT37) just raised the bar for air-gapped network attacks. Their new Ruby...

Learn More 0 0Feb 27

AI-Generated Exploit Code — When LLMs Become Weaponized Attack Engines

TL;DR Large language models can now generate working exploit code. Attackers are...

Learn More 0 0Mar 10

Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Community Alert: Unmasking a Coordinated Malware Campaign on GitHub Targeting Crypto Users...

Learn More 0 0Feb 13