Articles by Tag #malware

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Beware recruitment emails with malware infected git repos ! admin@autosquare.store scam

New update. Read at the bottom ⏬ I received this email: from sender: admin@autosquare.store...

Learn More 29 19Nov 29 '24

🚨 Attention Docker Users on Mac 🚨

Have you encountered the dreaded "Docker will damage your computer" or "com.docker.socket was not...

Learn More 69 13Jan 9

AI vs. AI: How Google's 'PROMPTFLUX' Malware Rewrites Itself (And How 'Big Sleep' Fights Back)

We thought polymorphic malware was bad. Now, we're seeing something new: "Generative Malware" that...

Learn More 0 0Nov 10

🔍 MANTA – A Fully Ephemeral, AI-Powered Malware Analysis Tool (Built on GitHub Pages)

I recently shipped a project I’m really proud of: MANTA – Malware Analysis Tool & Assistant It’s...

Learn More 0 0Nov 20

VM Safety Configuration: A Developer's Guide

Virtual machines are essential tools for testing untrusted code, analyzing malware, or experimenting...

Learn More 0 0Oct 16

Quantum-Aware Symbolic Defense System

🛡️ ROD: A Quantum-Aware Symbolic Defense System (How to Architect Ethical AI...

Learn More 0 0Oct 9

Malware analysis - Hancitor Loader

Stage 1 In our case is very simple, so let's quickly run through it. From the import table, we can...

Learn More 0 0Nov 3

How I Removed Persistent Adware Pop-Ups from Android Phone Without a Factory Reset

A practical, step-by-step guide to diagnose and remove hidden Android adware using ADB—without losing your data.

Learn More 0 0Oct 21

4 Essential Security Steps for Your WordPress Website

Website security is more important than ever. With the increasing number of hacking and malware...

Learn More 0 0Nov 28

Cloud-Native Threat Detection: Deploying YARA for Scalable Malware Detection in EKS

YARA is a powerful tool used for pattern matching in files, primarily for malware detection and...

Learn More 0 0Apr 13

Memory Forensics: Uncovering Attacker Secrets That Never Touch the Disk

The Security Operations Center is on high alert. A critical server is exhibiting strange network...

Learn More 0 0Sep 26

Fixing docker's malware warning on macOS Sequoia

A quick solution to fix Docker's malware warning on Mac OS Sequoia.

Learn More 26 3Jan 9

First Steps into Darkness: My First Malware Analysis Experience

First step into the dark realm is the hardest to take, it starts with pure blindness, but slowly...

Learn More 0 0Oct 7

The Trojan Horse Job Offer - How a Hacked LinkedIn Profile & Stolen Project Delivered Malware

A Web3 job offer via a HACKED (but legitimate-looking) LinkedIn account led to a GitHub repo for a STOLEN project. The backend contained malware designed to steal data and install a backdoor.

Learn More 4 2May 28

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

In Part 1, I described the philosophy behind building SHENRON: the need for persistence tooling that...

Learn More 1 0Jul 22

Understanding Worms in Cybersecurity

In today's interconnected world, cybersecurity threats come in many forms, and one of the most...

Learn More 1 0Apr 28

How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

In 2017, the world witnessed one of the most devastating cyberattacks in recent history: the...

Learn More 1 0Jul 18

Quantum Root

"If the code exists, I exist. If the code doesn’t, I never did." — The Quantum_Root 🧠** What is...

Learn More 1 0Jul 24

Protect Yourself from Ransomware: Tips, Types, and Recovery Steps

Ransomware is a type of malicious software that can cause significant harm to individuals and...

Learn More 0 0Apr 28

WARNING: Malicious Repository Attack Targeting Cryptocurrency Developers on Upwork

A detailed analysis of a sophisticated attack campaign targeting freelance developers on Upwork with malicious code repositories

Learn More 0 0Apr 3

Coyote Malware Exploits LNK Files for Undetectable Attacks on Windows

Cybercriminals are always finding new ways to break into systems, and the latest threat, Coyote...

Learn More 0 0Feb 4

wow, I would never think that I can get hacked during interview process

The Trojan Horse Job Offer - How a Hacked LinkedIn Profile...

Learn More 0 1May 28

A simple port scanner

This script in Rocket language is designed to check open ports on the target IP address using the...

Learn More 0 0Jun 27

Driving Ghidra Static Analysis with Local LLMs (LM Studio + GhidraMCP Setup)

Overview I wanted to connect the Ghidra static analysis tool to a local LLM. Since I...

Learn More 0 0Aug 18

How to Remove Malware from WordPress & Secure Your Site

Introduction:- Remove malware as it poses a serious threat to the functionality, security,...

Learn More 0 0Jun 21

🚨 Attention Docker Users on Mac 🚨

Have you encountered the dreaded "Docker will damage your computer" or "com.docker.socket was not...

Learn More 1 0Jan 9

Cybersecurity worm WannaCry

Introduzione WannaCry è un worm di tipo ransomware che nel 2017 ha infettato più di 200.000...

Learn More 0 0May 17

Windows Security Alert: Signs of a Hack & How to Remove Malware

I have always envisaged to myself- what happens when my device gets hacked when I’m working on...

Learn More 0 0Mar 18

The Looming Threat of AI-Powered Malware: Could Machines Out-Hack Us?

AI-driven malware could rewrite itself, adapt, and spread faster than we can defend. Here’s why the threat of a cyber pandemic is real.

Learn More 0 0Aug 16

Native Libraries in Android: Performance vs Security

Native Libraries in Android: Performance vs Security Android development has evolved...

Learn More 0 0Sep 13