Groups
Groups
Sign in
Groups
Groups
Technical - Malware
Conversations
About
Send feedback
Help
Technical - Malware
1–30 of 8794
Mark all as read
Report group
0 selected
Eyal Estrin
1:58 AM
Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT
https://www.elastic.co/security-labs/phantom-in-the-vault Eyal Estrin Author | Cloud Architect | AWS
unread,
Phantom in the vault: Obsidian abused to deliver PhantomPulse RAT
https://www.elastic.co/security-labs/phantom-in-the-vault Eyal Estrin Author | Cloud Architect | AWS
1:58 AM
Eyal Estrin
1:58 AM
Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise
https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-
unread,
Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise
https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-
1:58 AM
Eyal Estrin
1:58 AM
Mirax: a new Android RAT turning infected devices into potential residential proxy nodes
https://www.cleafy.com/cleafy-labs/mirax-a-new-android-rat-turning-infected-devices-into-potential-
unread,
Mirax: a new Android RAT turning infected devices into potential residential proxy nodes
https://www.cleafy.com/cleafy-labs/mirax-a-new-android-rat-turning-infected-devices-into-potential-
1:58 AM
Eyal Estrin
1:58 AM
A fake Slack download is giving attackers a hidden desktop on your machine
https://www.malwarebytes.com/blog/threat-intel/2026/04/a-fake-slack-download-is-giving-attackers-a-
unread,
A fake Slack download is giving attackers a hidden desktop on your machine
https://www.malwarebytes.com/blog/threat-intel/2026/04/a-fake-slack-download-is-giving-attackers-a-
1:58 AM
Eyal Estrin
1:58 AM
When PUPs Grow Fangs: Dragon Boss Solutions Left an Open Door on 25,000+ Endpoints
https://www.huntress.com/blog/pups-grow-fangs Eyal Estrin Author | Cloud Architect | AWS • Azure •
unread,
When PUPs Grow Fangs: Dragon Boss Solutions Left an Open Door on 25,000+ Endpoints
https://www.huntress.com/blog/pups-grow-fangs Eyal Estrin Author | Cloud Architect | AWS • Azure •
1:58 AM
Eyal Estrin
Apr 15
Introducing a new spam policy for "back button hijacking"
https://developers.google.com/search/blog/2026/04/back-button-hijacking https://arstechnica.com/
unread,
Introducing a new spam policy for "back button hijacking"
https://developers.google.com/search/blog/2026/04/back-button-hijacking https://arstechnica.com/
Apr 15
Eyal Estrin
Apr 15
108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure
https://socket.dev/blog/108-chrome-ext-linked-to-data-exfil-session-theft-shared-c2 Eyal Estrin
unread,
108 Chrome Extensions Linked to Data Exfiltration and Session Theft via Shared C2 Infrastructure
https://socket.dev/blog/108-chrome-ext-linked-to-data-exfil-session-theft-shared-c2 Eyal Estrin
Apr 15
Eyal Estrin
Apr 15
Satori Threat Intelligence Alert: Pushpaganda Manipulates Google Discovery Feeds with AI-Generated Content to Spread Malicious Notifications
https://www.humansecurity.com/learn/resource/satori-threat-intelligence-alert-pushpaganda-manipulates
unread,
Satori Threat Intelligence Alert: Pushpaganda Manipulates Google Discovery Feeds with AI-Generated Content to Spread Malicious Notifications
https://www.humansecurity.com/learn/resource/satori-threat-intelligence-alert-pushpaganda-manipulates
Apr 15
Eyal Estrin
Apr 14
APT37’s Pretexting-Based Targeted Intrusion: Analysis of Facebook Reconnaissance and Software Tampering Attacks
https://www.genians.co.kr/en/blog/threat_intelligence/pretexting Eyal Estrin Author | Cloud Architect
unread,
APT37’s Pretexting-Based Targeted Intrusion: Analysis of Facebook Reconnaissance and Software Tampering Attacks
https://www.genians.co.kr/en/blog/threat_intelligence/pretexting Eyal Estrin Author | Cloud Architect
Apr 14
Eyal Estrin
Apr 12
CPU-Z / HWMonitor watering hole infection – a copy-pasted attack
https://securelist.com/tr/cpu-z/119365/ Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP
unread,
CPU-Z / HWMonitor watering hole infection – a copy-pasted attack
https://securelist.com/tr/cpu-z/119365/ Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP
Apr 12
Eyal Estrin
Apr 11
ClickFix technique uses Script Editor instead of Terminal on macOS
https://www.jamf.com/blog/clickfix-macos-script-editor-atomic-stealer/ Eyal Estrin Author | Cloud
unread,
ClickFix technique uses Script Editor instead of Terminal on macOS
https://www.jamf.com/blog/clickfix-macos-script-editor-atomic-stealer/ Eyal Estrin Author | Cloud
Apr 11
Eyal Estrin
Apr 9
Darktrace Identifies New Chaos Malware Variant Exploiting Misconfigurations in the Cloud
https://www.darktrace.com/blog/darktrace-identifies-new-chaos-malware-variant-exploiting-
unread,
Darktrace Identifies New Chaos Malware Variant Exploiting Misconfigurations in the Cloud
https://www.darktrace.com/blog/darktrace-identifies-new-chaos-malware-variant-exploiting-
Apr 9
Eyal Estrin
Apr 9
Inside an AI‑enabled device code phishing campaign
https://www.microsoft.com/en-us/security/blog/2026/04/06/ai-enabled-device-code-phishing-campaign-
unread,
Inside an AI‑enabled device code phishing campaign
https://www.microsoft.com/en-us/security/blog/2026/04/06/ai-enabled-device-code-phishing-campaign-
Apr 9
Eyal Estrin
Apr 9
Masjesu Rising: The Commercial IoT Botnet Built for Stealth, DDoS, and IoT Evasion
https://www.trellix.com/blogs/research/masjesu-rising-stealth-iot-botnet-ddos-evasion/ Eyal Estrin
unread,
Masjesu Rising: The Commercial IoT Botnet Built for Stealth, DDoS, and IoT Evasion
https://www.trellix.com/blogs/research/masjesu-rising-stealth-iot-botnet-ddos-evasion/ Eyal Estrin
Apr 9
Eyal Estrin
Apr 9
North Korea’s Contagious Interview Campaign Spreads Across 5 Ecosystems, Delivering Staged RAT Payloads
https://socket.dev/blog/contagious-interview-campaign-spreads-across-5-ecosystems Eyal Estrin Author
unread,
North Korea’s Contagious Interview Campaign Spreads Across 5 Ecosystems, Delivering Staged RAT Payloads
https://socket.dev/blog/contagious-interview-campaign-spreads-across-5-ecosystems Eyal Estrin Author
Apr 9
Eyal Estrin
Apr 9
Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations
https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-
unread,
Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations
https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-
Apr 9
Eyal Estrin
Apr 8
Thousands of users got affected by OneDrive unstoppable spam on Windows, Android, Mac
https://www.neowin.net/news/thousands-of-users-got-affected-by-onedrive-unstoppable-spam-on-windows-
unread,
Thousands of users got affected by OneDrive unstoppable spam on Windows, Android, Mac
https://www.neowin.net/news/thousands-of-users-got-affected-by-onedrive-unstoppable-spam-on-windows-
Apr 8
Eyal Estrin
Apr 8
Ransomware attack on Vivaticket disrupts Louvre and major European museums
https://cybernews.com/cybercrime/ransomware-attack-on-vivaticket-disrupts-louvre-and-major-european-
unread,
Ransomware attack on Vivaticket disrupts Louvre and major European museums
https://cybernews.com/cybercrime/ransomware-attack-on-vivaticket-disrupts-louvre-and-major-european-
Apr 8
Eyal Estrin
Apr 8
Hackers Are Attempting to Turn ComfyUI Servers Into a Cryptomining Proxy Botnet
https://censys.com/blog/comfyui-servers-cryptomining-proxy-botnet/ Eyal Estrin Author | Cloud
unread,
Hackers Are Attempting to Turn ComfyUI Servers Into a Cryptomining Proxy Botnet
https://censys.com/blog/comfyui-servers-cryptomining-proxy-botnet/ Eyal Estrin Author | Cloud
Apr 8
Eyal Estrin
Apr 7
Italian spyware vendor creates Fake WhatsApp app, targeting 200 users
https://securityaffairs.com/190276/malware/italian-spyware-vendor-creates-fake-whatsapp-app-targeting
unread,
Italian spyware vendor creates Fake WhatsApp app, targeting 200 users
https://securityaffairs.com/190276/malware/italian-spyware-vendor-creates-fake-whatsapp-app-targeting
Apr 7
Eyal Estrin
Apr 5
Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense
https://www.darkreading.com/cybersecurity-operations/ransomware-hospitals-preparation-key-defense
unread,
Ransomware Will Hit Hospitals. Rehearsals Are Key to Defense
https://www.darkreading.com/cybersecurity-operations/ransomware-hospitals-preparation-key-defense
Apr 5
Eyal Estrin
Apr 4
DPRK-Related Campaigns with LNK and GitHub C2
https://www.fortinet.com/blog/threat-research/dprk-related-campaigns-with-lnk-and-github-c2 Eyal
unread,
DPRK-Related Campaigns with LNK and GitHub C2
https://www.fortinet.com/blog/threat-research/dprk-related-campaigns-with-lnk-and-github-c2 Eyal
Apr 4
Eyal Estrin
Apr 4
Meet VENOM: The PhaaS Platform That Neutralizes MFA
https://abnormal.ai/blog/venom-phishing-campaign-mfa-credential-theft Eyal Estrin Author | Cloud
unread,
Meet VENOM: The PhaaS Platform That Neutralizes MFA
https://abnormal.ai/blog/venom-phishing-campaign-mfa-credential-theft Eyal Estrin Author | Cloud
Apr 4
Eyal Estrin
Apr 4
Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets
https://research.checkpoint.com/2026/operation-truechaos-0-day-exploitation-against-southeast-asian-
unread,
Operation TrueChaos: 0-Day Exploitation Against Southeast Asian Government Targets
https://research.checkpoint.com/2026/operation-truechaos-0-day-exploitation-against-southeast-asian-
Apr 4
Eyal Estrin
Apr 3
vSphere and BRICKSTORM Malware: A Defender's Guide
https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide Eyal
unread,
vSphere and BRICKSTORM Malware: A Defender's Guide
https://cloud.google.com/blog/topics/threat-intelligence/vsphere-brickstorm-defender-guide Eyal
Apr 3
Eyal Estrin
Apr 2
A laughing RAT: CrystalX combines spyware, stealer, and prankware features
https://securelist.com/crystalx-rat-with-prankware-features/119283/ Eyal Estrin Author | Cloud
unread,
A laughing RAT: CrystalX combines spyware, stealer, and prankware features
https://securelist.com/crystalx-rat-with-prankware-features/119283/ Eyal Estrin Author | Cloud
Apr 2
Eyal Estrin
Apr 2
Operation NoVoice: Rootkit Tells No Tales
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/new-research-operation-novoice-rootkit-malware-
unread,
Operation NoVoice: Rootkit Tells No Tales
https://www.mcafee.com/blogs/other-blogs/mcafee-labs/new-research-operation-novoice-rootkit-malware-
Apr 2
Eyal Estrin
Apr 2
WhatsApp malware campaign delivers VBScript and MSI backdoors
https://www.microsoft.com/en-us/security/blog/2026/03/31/whatsapp-malware-campaign-delivers-vbs-
unread,
WhatsApp malware campaign delivers VBScript and MSI backdoors
https://www.microsoft.com/en-us/security/blog/2026/03/31/whatsapp-malware-campaign-delivers-vbs-
Apr 2
Eyal Estrin
Apr 2
WhatsApp notifies hundreds of users who installed a fake app made by government spyware maker
https://techcrunch.com/2026/04/01/whatsapp-notifies-hundreds-of-users-who-installed-a-fake-app-that-
unread,
WhatsApp notifies hundreds of users who installed a fake app made by government spyware maker
https://techcrunch.com/2026/04/01/whatsapp-notifies-hundreds-of-users-who-installed-a-fake-app-that-
Apr 2
Eyal Estrin
Apr 2
Unpacking Augmented Marauder’s Multi-Pronged Casbaneiro Campaigns
https://www.bluevoyant.com/blog/augmented-marauders-multi-pronged-casbaneiro-campaigns Eyal Estrin
unread,
Unpacking Augmented Marauder’s Multi-Pronged Casbaneiro Campaigns
https://www.bluevoyant.com/blog/augmented-marauders-multi-pronged-casbaneiro-campaigns Eyal Estrin
Apr 2