Groups
Groups
Sign in
Groups
Groups
Technical - Malware
Conversations
About
Send feedback
Help
Technical - Malware
1–30 of 8700
Mark all as read
Report group
0 selected
Eyal Estrin
12:27 AM
New backdoor found in Android tablets targeting users in Russia, Germany and Japan
https://therecord.media/new-backdoor-found-in-android-russia-japan-brazil Eyal Estrin Author | Cloud
unread,
New backdoor found in Android tablets targeting users in Russia, Germany and Japan
https://therecord.media/new-backdoor-found-in-android-russia-japan-brazil Eyal Estrin Author | Cloud
12:27 AM
Eyal Estrin
Feb 19
Scammers use fake “Gemini” AI chatbot to sell fake “Google Coin”
https://www.malwarebytes.com/blog/ai/2026/02/scammers-use-fake-gemini-ai-chatbot-to-sell-fake-google-
unread,
Scammers use fake “Gemini” AI chatbot to sell fake “Google Coin”
https://www.malwarebytes.com/blog/ai/2026/02/scammers-use-fake-gemini-ai-chatbot-to-sell-fake-google-
Feb 19
Eyal Estrin
Feb 19
PromptSpy ushers in the era of Android threats using GenAI
https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/
unread,
PromptSpy ushers in the era of Android threats using GenAI
https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/
Feb 19
Eyal Estrin
Feb 19
Intellexa’s Predator spyware used to hack iPhone of journalist in Angola, research says
https://techcrunch.com/2026/02/17/intellexas-predator-spyware-used-to-hack-iphone-of-journalist-in-
unread,
Intellexa’s Predator spyware used to hack iPhone of journalist in Angola, research says
https://techcrunch.com/2026/02/17/intellexas-predator-spyware-used-to-hack-iphone-of-journalist-in-
Feb 19
Eyal Estrin
Feb 19
Starkiller: New Phishing Framework Proxies Real Login Pages to Bypass MFA
https://abnormal.ai/blog/starkiller-phishing-kit Eyal Estrin Author | Cloud Architect | AWS • Azure •
unread,
Starkiller: New Phishing Framework Proxies Real Login Pages to Bypass MFA
https://abnormal.ai/blog/starkiller-phishing-kit Eyal Estrin Author | Cloud Architect | AWS • Azure •
Feb 19
Eyal Estrin
Feb 19
Massiv: When your IPTV app terminates your savings
https://www.threatfabric.com/blogs/massiv-when-your-iptv-app-terminates-your-savings Eyal Estrin
unread,
Massiv: When your IPTV app terminates your savings
https://www.threatfabric.com/blogs/massiv-when-your-iptv-app-terminates-your-savings Eyal Estrin
Feb 19
Eyal Estrin
Feb 18
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
https://securelist.com/keenadu-android-backdoor/118913/ Eyal Estrin Author | Cloud Architect | AWS •
unread,
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets
https://securelist.com/keenadu-android-backdoor/118913/ Eyal Estrin Author | Cloud Architect | AWS •
Feb 18
Eyal Estrin
Feb 17
Operation DoppelBrand: Massive Fortune 500 Brand Impersonation Campaign Uncovered
https://socradar.io/blog/operation-doppelbrand-fortune-500-campaign/ Eyal Estrin Author | Cloud
unread,
Operation DoppelBrand: Massive Fortune 500 Brand Impersonation Campaign Uncovered
https://socradar.io/blog/operation-doppelbrand-fortune-500-campaign/ Eyal Estrin Author | Cloud
Feb 17
Eyal Estrin
Feb 15
CISA updates Brickstorm malware report with new .NET-compiled variant and expanded detection guidance
https://industrialcyber.co/ransomware/cisa-updates-brickstorm-malware-report-with-new-net-compiled-
unread,
CISA updates Brickstorm malware report with new .NET-compiled variant and expanded detection guidance
https://industrialcyber.co/ransomware/cisa-updates-brickstorm-malware-report-with-new-net-compiled-
Feb 15
Eyal Estrin
Feb 15
Employee Monitoring and SimpleHelp Software Abused in Ransomware Operations
https://www.huntress.com/blog/employee-monitoring-simplehelp-abused-in-ransomware-operations Eyal
unread,
Employee Monitoring and SimpleHelp Software Abused in Ransomware Operations
https://www.huntress.com/blog/employee-monitoring-simplehelp-abused-in-ransomware-operations Eyal
Feb 15
Eyal Estrin
Feb 13
Fake recruiter campaign targets crypto devs
https://www.reversinglabs.com/blog/fake-recruiter-campaign-crypto-devs Eyal Estrin Author | Cloud
unread,
Fake recruiter campaign targets crypto devs
https://www.reversinglabs.com/blog/fake-recruiter-campaign-crypto-devs Eyal Estrin Author | Cloud
Feb 13
Eyal Estrin
Feb 13
Phorpiex Phishing Campaign Delivers GLOBAL GROUP Ransomware
https://www.forcepoint.com/blog/x-labs/phorpiex-global-group-ransomware-lnk-phishing Eyal Estrin
unread,
Phorpiex Phishing Campaign Delivers GLOBAL GROUP Ransomware
https://www.forcepoint.com/blog/x-labs/phorpiex-global-group-ransomware-lnk-phishing Eyal Estrin
Feb 13
Eyal Estrin
Feb 13
Breaking Down ZeroDayRAT - New Spyware Targeting Android and iOS
https://iverify.io/blog/breaking-down-zerodayrat---new-spyware-targeting-android-and-ios Eyal Estrin
unread,
Breaking Down ZeroDayRAT - New Spyware Targeting Android and iOS
https://iverify.io/blog/breaking-down-zerodayrat---new-spyware-targeting-android-and-ios Eyal Estrin
Feb 13
Eyal Estrin
Feb 13
AgreeToSteal: The First Malicious Outlook Add-In Leads to 4,000 Stolen Credentials
https://www.koi.ai/blog/agreetosteal-the-first-malicious-outlook-add-in-leads-to-4-000-stolen-
unread,
AgreeToSteal: The First Malicious Outlook Add-In Leads to 4,000 Stolen Credentials
https://www.koi.ai/blog/agreetosteal-the-first-malicious-outlook-add-in-leads-to-4-000-stolen-
Feb 13
Eyal Estrin
Feb 12
LummaStealer Is Getting a Second Life Alongside CastleLoader
https://www.bitdefender.com/en-us/blog/labs/lummastealer-second-life-castleloader Eyal Estrin Author
unread,
LummaStealer Is Getting a Second Life Alongside CastleLoader
https://www.bitdefender.com/en-us/blog/labs/lummastealer-second-life-castleloader Eyal Estrin Author
Feb 12
Eyal Estrin
Feb 12
CISA Updates BRICKSTORM Backdoor Malware Analysis Report (AR25-338A)
https://www.cisa.gov/news-events/analysis-reports/ar25-338a Eyal Estrin Author | Cloud Architect |
unread,
CISA Updates BRICKSTORM Backdoor Malware Analysis Report (AR25-338A)
https://www.cisa.gov/news-events/analysis-reports/ar25-338a Eyal Estrin Author | Cloud Architect |
Feb 12
Eyal Estrin
Feb 11
Fake 7-Zip downloads are turning home PCs into proxy nodes
https://www.malwarebytes.com/blog/threat-intel/2026/02/fake-7-zip-downloads-are-turning-home-pcs-into
unread,
Fake 7-Zip downloads are turning home PCs into proxy nodes
https://www.malwarebytes.com/blog/threat-intel/2026/02/fake-7-zip-downloads-are-turning-home-pcs-into
Feb 11
Eyal Estrin
Feb 10
Reynolds: Defense Evasion Capability Embedded in Ransomware Payload
https://www.security.com/threat-intelligence/black-basta-ransomware-byovd Eyal Estrin Author | Cloud
unread,
Reynolds: Defense Evasion Capability Embedded in Ransomware Payload
https://www.security.com/threat-intelligence/black-basta-ransomware-byovd Eyal Estrin Author | Cloud
Feb 10
Eyal Estrin
Feb 10
Threat Alert: TeamPCP, An Emerging Force in the Cloud Native and Ransomware Landscape
https://flare.io/learn/resources/blog/teampcp-cloud-native-ransomware Eyal Estrin Author | Cloud
unread,
Threat Alert: TeamPCP, An Emerging Force in the Cloud Native and Ransomware Landscape
https://flare.io/learn/resources/blog/teampcp-cloud-native-ransomware Eyal Estrin Author | Cloud
Feb 10
Eyal Estrin
Feb 8
Everest Ransomware Claims 90GB Data Theft Involving Legacy Polycom Systems
https://hackread.com/everest-ransomware-data-theft-legacy-polycom-system/ Eyal Estrin Author | Cloud
unread,
Everest Ransomware Claims 90GB Data Theft Involving Legacy Polycom Systems
https://hackread.com/everest-ransomware-data-theft-legacy-polycom-system/ Eyal Estrin Author | Cloud
Feb 8
Eyal Estrin
Feb 8
Threat Actors Leverage Hugging Face to Spread Android Malware at Scale
https://www.cysecurity.news/2026/02/threat-actors-leverage-hugging-face-to.html Eyal Estrin Author |
unread,
Threat Actors Leverage Hugging Face to Spread Android Malware at Scale
https://www.cysecurity.news/2026/02/threat-actors-leverage-hugging-face-to.html Eyal Estrin Author |
Feb 8
Eyal Estrin
Feb 7
Open the wrong "PDF" and attackers gain remote access to your PC
https://www.malwarebytes.com/blog/news/2026/02/open-the-wrong-pdf-and-attackers-gain-remote-access-to
unread,
Open the wrong "PDF" and attackers gain remote access to your PC
https://www.malwarebytes.com/blog/news/2026/02/open-the-wrong-pdf-and-attackers-gain-remote-access-to
Feb 7
Eyal Estrin
Feb 6
How 0apt is Using Random Noise to Fake a Ransomware Empire
https://databreach.com/news/44-how-0apt-is-using-random-noise-to-fake-a-ransomware-empire Eyal Estrin
unread,
How 0apt is Using Random Noise to Fake a Ransomware Empire
https://databreach.com/news/44-how-0apt-is-using-random-noise-to-fake-a-ransomware-empire Eyal Estrin
Feb 6
Eyal Estrin
Feb 5
Machine-scale cybercrime: The 2026 State of Malware report
https://www.threatdown.com/blog/machine-scale-cybercrime-the-2026-state-of-malware-report/ Eyal
unread,
Machine-scale cybercrime: The 2026 State of Malware report
https://www.threatdown.com/blog/machine-scale-cybercrime-the-2026-state-of-malware-report/ Eyal
Feb 5
Eyal Estrin
Feb 5
Silent Push Identifies More Than 10,000 Infected IPs as Part of SystemBC Botnet Malware Family
https://www.silentpush.com/blog/systembc/ Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP
unread,
Silent Push Identifies More Than 10,000 Infected IPs as Part of SystemBC Botnet Malware Family
https://www.silentpush.com/blog/systembc/ Eyal Estrin Author | Cloud Architect | AWS • Azure • GCP
Feb 5
Eyal Estrin
Feb 5
Harassment, Scare Tactics, & Why Victims Should Never Pay ShinyHunters
https://blog.unit221b.com/dont-read-this-blog/harassment-scare-tactics-why-victims-should-never-pay-
unread,
Harassment, Scare Tactics, & Why Victims Should Never Pay ShinyHunters
https://blog.unit221b.com/dont-read-this-blog/harassment-scare-tactics-why-victims-should-never-pay-
Feb 5
Eyal Estrin
Feb 5
New Clickfix variant ‘CrashFix’ deploying Python Remote Access Trojan
https://www.microsoft.com/en-us/security/blog/2026/02/05/clickfix-variant-crashfix-deploying-python-
unread,
New Clickfix variant ‘CrashFix’ deploying Python Remote Access Trojan
https://www.microsoft.com/en-us/security/blog/2026/02/05/clickfix-variant-crashfix-deploying-python-
Feb 5
Eyal Estrin
Feb 5
APT28 Leverages CVE-2026-21509 in Operation Neusploit
https://www.zscaler.com/blogs/security-research/apt28-leverages-cve-2026-21509-operation-neusploit
unread,
APT28 Leverages CVE-2026-21509 in Operation Neusploit
https://www.zscaler.com/blogs/security-research/apt28-leverages-cve-2026-21509-operation-neusploit
Feb 5
Eyal Estrin
Feb 5
Infostealers without borders: macOS, Python stealers, and platform abuse
https://www.microsoft.com/en-us/security/blog/2026/02/02/infostealers-without-borders-macos-python-
unread,
Infostealers without borders: macOS, Python stealers, and platform abuse
https://www.microsoft.com/en-us/security/blog/2026/02/02/infostealers-without-borders-macos-python-
Feb 5
Eyal Estrin
Feb 5
CISA: VMware ESXi flaw now exploited in ransomware attacks
https://www.bleepingcomputer.com/news/security/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-
unread,
CISA: VMware ESXi flaw now exploited in ransomware attacks
https://www.bleepingcomputer.com/news/security/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-
Feb 5