Groups
Groups
Sign in
Groups
Groups
Technical - Malware
Conversations
About
Send feedback
Help
Technical - Malware
1–30 of 8569
Mark all as read
Report group
0 selected
Eyal Estrin
12:06 AM
New Matrix Push C2 Abuses Push Notifications to Deliver Malware
https://www.blackfog.com/new-matrix-push-c2-deliver-malware/ Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
New Matrix Push C2 Abuses Push Notifications to Deliver Malware
https://www.blackfog.com/new-matrix-push-c2-deliver-malware/ Eyal Estrin CISSP, CCSP, CISM, CISA,
12:06 AM
Eyal Estrin
Nov 22
Ransomware gangs seize a new hostage: your AWS S3 buckets
https://www.csoonline.com/article/4094475/ransomware-gangs-find-a-new-hostage-your-aws-s3-buckets.
unread,
Ransomware gangs seize a new hostage: your AWS S3 buckets
https://www.csoonline.com/article/4094475/ransomware-gangs-find-a-new-hostage-your-aws-s3-buckets.
Nov 22
Eyal Estrin
Nov 21
Blockchain and Node.js abused by Tsundere: an emerging botnet
https://securelist.com/tsundere-node-js-botnet-uses-ethereum-blockchain/117979/ Eyal Estrin CISSP,
unread,
Blockchain and Node.js abused by Tsundere: an emerging botnet
https://securelist.com/tsundere-node-js-botnet-uses-ethereum-blockchain/117979/ Eyal Estrin CISSP,
Nov 21
Eyal Estrin
Nov 21
A Pain in the Mist: Navigating Operation DreamJob’s arsenal
https://www.orangecyberdefense.com/global/blog/cert-news/a-pain-in-the-mist-navigating-operation-
unread,
A Pain in the Mist: Navigating Operation DreamJob’s arsenal
https://www.orangecyberdefense.com/global/blog/cert-news/a-pain-in-the-mist-navigating-operation-
Nov 21
Eyal Estrin
Nov 21
Analysis Report on AI-Based Obfuscated Malicious Apps Using Compromised Legitimate Websites as C2 Servers
https://asec.ahnlab.com/en/91176/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog: https://
unread,
Analysis Report on AI-Based Obfuscated Malicious Apps Using Compromised Legitimate Websites as C2 Servers
https://asec.ahnlab.com/en/91176/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog: https://
Nov 21
Eyal Estrin
Nov 20
PlushDaemon compromises network devices for adversary-in-the-middle attacks
https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary
unread,
PlushDaemon compromises network devices for adversary-in-the-middle attacks
https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary
Nov 20
Eyal Estrin
Nov 20
Sturnus: Mobile Banking Malware bypassing WhatsApp, Telegram and Signal Encryption
https://www.threatfabric.com/blogs/sturnus-banking-trojan-bypassing-whatsapp-telegram-and-signal Eyal
unread,
Sturnus: Mobile Banking Malware bypassing WhatsApp, Telegram and Signal Encryption
https://www.threatfabric.com/blogs/sturnus-banking-trojan-bypassing-whatsapp-telegram-and-signal Eyal
Nov 20
Eyal Estrin
Nov 20
Cooking up trouble: How TamperedChef uses signed apps to deliver stealthy payloads
https://www.acronis.com/en/tru/posts/cooking-up-trouble-how-tamperedchef-uses-signed-apps-to-deliver-
unread,
Cooking up trouble: How TamperedChef uses signed apps to deliver stealthy payloads
https://www.acronis.com/en/tru/posts/cooking-up-trouble-how-tamperedchef-uses-signed-apps-to-deliver-
Nov 20
Eyal Estrin
Nov 19
SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/spiderlabs-ids-new-banking-trojan-
unread,
SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/spiderlabs-ids-new-banking-trojan-
Nov 19
Eyal Estrin
Nov 19
Microsoft warns that Windows 11’s agentic OS could open the door to new security risks, with Xpia malware showing how AI-driven systems may be exploited by attackers
https://www.windowscentral.com/microsoft/windows-11/microsoft-warns-security-risks-agentic-os-windows
unread,
Microsoft warns that Windows 11’s agentic OS could open the door to new security risks, with Xpia malware showing how AI-driven systems may be exploited by attackers
https://www.windowscentral.com/microsoft/windows-11/microsoft-warns-security-risks-agentic-os-windows
Nov 19
Eyal Estrin
Nov 19
ShadowRay 2.0: Attackers Turn AI Against Itself in Global Campaign that Hijacks AI Into Self-Propagating Botnet
https://www.oligo.security/blog/shadowray-2-0-attackers-turn-ai-against-itself-in-global-campaign-
unread,
ShadowRay 2.0: Attackers Turn AI Against Itself in Global Campaign that Hijacks AI Into Self-Propagating Botnet
https://www.oligo.security/blog/shadowray-2-0-attackers-turn-ai-against-itself-in-global-campaign-
Nov 19
Eyal Estrin
Nov 18
EVALUSION Campaign Delivers Amatera Stealer and NetSupport RAT
https://www.esentire.com/blog/evalusion-campaign-delivers-amatera-stealer-and-netsupport-rat Eyal
unread,
EVALUSION Campaign Delivers Amatera Stealer and NetSupport RAT
https://www.esentire.com/blog/evalusion-campaign-delivers-amatera-stealer-and-netsupport-rat Eyal
Nov 18
Eyal Estrin
Nov 17
Hackers Use KakaoTalk and Google Find Hub in Android Spyware Attack
https://hackread.com/hackers-kakaotalk-google-find-hub-android-spyware/ Eyal Estrin CISSP, CCSP, CISM
unread,
Hackers Use KakaoTalk and Google Find Hub in Android Spyware Attack
https://hackread.com/hackers-kakaotalk-google-find-hub-android-spyware/ Eyal Estrin CISSP, CCSP, CISM
Nov 17
Eyal Estrin
Nov 15
Digit stealer: a JXA-based infostealer that leaves little footprint
https://www.jamf.com/blog/jtl-digitstealer-macos-infostealer-analysis/ Eyal Estrin CISSP, CCSP, CISM,
unread,
Digit stealer: a JXA-based infostealer that leaves little footprint
https://www.jamf.com/blog/jtl-digitstealer-macos-infostealer-analysis/ Eyal Estrin CISSP, CCSP, CISM,
Nov 15
Eyal Estrin
Nov 15
Iranian Hackers Launch 'SpearSpecter' Spy Operation on Defense & Government Targets
https://thehackernews.com/2025/11/iranian-hackers-launch-spearspecter-spy.html Eyal Estrin CISSP,
unread,
Iranian Hackers Launch 'SpearSpecter' Spy Operation on Defense & Government Targets
https://thehackernews.com/2025/11/iranian-hackers-launch-spearspecter-spy.html Eyal Estrin CISSP,
Nov 15
Eyal Estrin
Nov 14
Critical: Remote Code Execution via Malicious Obfuscated Malware in Imunify360 AV (AI-bolit)
https://patchstack.com/articles/remote-code-execution-vulnerability-found-in-imunify360/ Eyal Estrin
unread,
Critical: Remote Code Execution via Malicious Obfuscated Malware in Imunify360 AV (AI-bolit)
https://patchstack.com/articles/remote-code-execution-vulnerability-found-in-imunify360/ Eyal Estrin
Nov 14
Eyal Estrin
Nov 14
Uhale Digital Picture Frame Security Assessment
https://go.quokka.io/hubfs/App-Intel/Technical_Uhale-Digital-Picture-Frame-Security-Assessment.pdf
unread,
Uhale Digital Picture Frame Security Assessment
https://go.quokka.io/hubfs/App-Intel/Technical_Uhale-Digital-Picture-Frame-Security-Assessment.pdf
Nov 14
Eyal Estrin
Nov 14
DarkComet RAT Malware Hidden Inside Fake Bitcoin Tool
https://www.pointwild.com/threat-intelligence/darkcomet-rat-malware-hidden-inside-fake-bitcoin-tool
unread,
DarkComet RAT Malware Hidden Inside Fake Bitcoin Tool
https://www.pointwild.com/threat-intelligence/darkcomet-rat-malware-hidden-inside-fake-bitcoin-tool
Nov 14
Eyal Estrin
Nov 14
Uncovering a Multi-Stage Phishing Kit Targeting Italy's Infrastructure
https://www.group-ib.com/blog/uncover-phishing-italy/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE,
unread,
Uncovering a Multi-Stage Phishing Kit Targeting Italy's Infrastructure
https://www.group-ib.com/blog/uncover-phishing-italy/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE,
Nov 14
Eyal Estrin
Nov 14
Inside the Ingram Micro Ransomware Attack: Lessons in Zero Trust
https://votiro.com/blog/inside-the-ingram-micro-ransomware-attack-lessons-in-zero-trust/ Eyal Estrin
unread,
Inside the Ingram Micro Ransomware Attack: Lessons in Zero Trust
https://votiro.com/blog/inside-the-ingram-micro-ransomware-attack-lessons-in-zero-trust/ Eyal Estrin
Nov 14
Eyal Estrin
Nov 14
Thousands of Domains Target Hotel Guests in Massive Phishing Campaign
https://www.netcraft.com/blog/thousands-of-domains-target-hotel-guests-in-massive-phishing-campaign
unread,
Thousands of Domains Target Hotel Guests in Massive Phishing Campaign
https://www.netcraft.com/blog/thousands-of-domains-target-hotel-guests-in-massive-phishing-campaign
Nov 14
Eyal Estrin
Nov 13
CISA and Partners Release Advisory Update on Akira Ransomware (AA24-109A)
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-109a Eyal Estrin CISSP, CCSP, CISM,
unread,
CISA and Partners Release Advisory Update on Akira Ransomware (AA24-109A)
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-109a Eyal Estrin CISSP, CCSP, CISM,
Nov 13
Eyal Estrin
Nov 13
Malicious Chrome Extension Exfiltrates Seed Phrases, Enabling Wallet Takeover
https://socket.dev/blog/malicious-chrome-extension-exfiltrates-seed-phrases Eyal Estrin CISSP, CCSP,
unread,
Malicious Chrome Extension Exfiltrates Seed Phrases, Enabling Wallet Takeover
https://socket.dev/blog/malicious-chrome-extension-exfiltrates-seed-phrases Eyal Estrin CISSP, CCSP,
Nov 13
Eyal Estrin
Nov 13
The Great Indonesian TEA Theft: Analyzing a NPM Spam Campaign
https://www.endorlabs.com/learn/the-great-indonesian-tea-theft-analyzing-a-npm-spam-campaign Eyal
unread,
The Great Indonesian TEA Theft: Analyzing a NPM Spam Campaign
https://www.endorlabs.com/learn/the-great-indonesian-tea-theft-analyzing-a-npm-spam-campaign Eyal
Nov 13
Eyal Estrin
Nov 13
New Phishing Campaign Exploits Meta Business Suite to Target SMBs Across the U.S. and Beyond
https://blog.checkpoint.com/email-security/new-phishing-campaign-exploits-meta-business-suite-to-
unread,
New Phishing Campaign Exploits Meta Business Suite to Target SMBs Across the U.S. and Beyond
https://blog.checkpoint.com/email-security/new-phishing-campaign-exploits-meta-business-suite-to-
Nov 13
Eyal Estrin
Nov 13
Global Cyber Attacks Surge in October 2025 Amid Explosive Ransomware Growth and Rising GenAI Threats
https://blog.checkpoint.com/research/global-cyber-attacks-surge-in-october-2025-amid-explosive-
unread,
Global Cyber Attacks Surge in October 2025 Amid Explosive Ransomware Growth and Rising GenAI Threats
https://blog.checkpoint.com/research/global-cyber-attacks-surge-in-october-2025-amid-explosive-
Nov 13
Eyal Estrin
Nov 13
Android Devices Targeted By KONNI APT in Find Hub Exploitation
https://www.infosecurity-magazine.com/news/android-devices-targeted-konni-apt/ https://www.genians.co
unread,
Android Devices Targeted By KONNI APT in Find Hub Exploitation
https://www.infosecurity-magazine.com/news/android-devices-targeted-konni-apt/ https://www.genians.co
Nov 13
Eyal Estrin
Nov 13
Maverick and Coyote: Analyzing the Link Between Two Evolving Brazilian Banking Trojans
https://www.cyberproof.com/blog/maverick-and-coyote-analyzing-the-link-between-two-evolving-brazilian
unread,
Maverick and Coyote: Analyzing the Link Between Two Evolving Brazilian Banking Trojans
https://www.cyberproof.com/blog/maverick-and-coyote-analyzing-the-link-between-two-evolving-brazilian
Nov 13
Eyal Estrin
Nov 11
Quantum Route Redirect PhaaS targets Microsoft 365 users worldwide
https://blog.knowbe4.com/quantum-route-redirect-anonymous-tool-streamlining-global-phishing-attack
unread,
Quantum Route Redirect PhaaS targets Microsoft 365 users worldwide
https://blog.knowbe4.com/quantum-route-redirect-anonymous-tool-streamlining-global-phishing-attack
Nov 11
Eyal Estrin
Nov 9
Malware Is Now Using AI to Rewrite Its Own Code to Avoid Detection
https://futurism.com/artificial-intelligence/malware-using-rewrite-code-avoid-detection Eyal Estrin
unread,
Malware Is Now Using AI to Rewrite Its Own Code to Avoid Detection
https://futurism.com/artificial-intelligence/malware-using-rewrite-code-avoid-detection Eyal Estrin
Nov 9