Groups
Groups
Sign in
Groups
Groups
Technical - Malware
Conversations
About
Send feedback
Help
Technical - Malware
1–30 of 8659
Mark all as read
Report group
0 selected
Eyal Estrin
2:23 AM
Inside a Multi-Stage Windows Malware Campaign
https://www.fortinet.com/blog/threat-research/inside-a-multi-stage-windows-malware-campaign Eyal
unread,
Inside a Multi-Stage Windows Malware Campaign
https://www.fortinet.com/blog/threat-research/inside-a-multi-stage-windows-malware-campaign Eyal
2:23 AM
Eyal Estrin
2:23 AM
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-
unread,
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-
2:23 AM
Eyal Estrin
Jan 24
Stanley — A $6,000 Russian Malware Toolkit with Chrome Web Store Guarantee
https://www.varonis.com/blog/stanley-malware-kit Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK
unread,
Stanley — A $6,000 Russian Malware Toolkit with Chrome Web Store Guarantee
https://www.varonis.com/blog/stanley-malware-kit Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK
Jan 24
Eyal Estrin
Jan 24
The Skeleton Key: How Attackers Weaponize Trusted RMM Tools for Backdoor Access
https://blog.knowbe4.com/the-skeleton-key-how-attackers-weaponize-trusted-rmm-tools-for-backdoor-
unread,
The Skeleton Key: How Attackers Weaponize Trusted RMM Tools for Backdoor Access
https://blog.knowbe4.com/the-skeleton-key-how-attackers-weaponize-trusted-rmm-tools-for-backdoor-
Jan 24
Eyal Estrin
Jan 23
PyPI Package Impersonates SymPy to Deliver Cryptomining Malware
https://socket.dev/blog/pypi-package-impersonates-sympy-to-deliver-cryptomining-malware Eyal Estrin
unread,
PyPI Package Impersonates SymPy to Deliver Cryptomining Malware
https://socket.dev/blog/pypi-package-impersonates-sympy-to-deliver-cryptomining-malware Eyal Estrin
Jan 23
Eyal Estrin
Jan 22
Ransomware attacks soar with a 45% increase in 2025
https://nordstellar.com/blog/ransomware-statistics/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK
unread,
Ransomware attacks soar with a 45% increase in 2025
https://nordstellar.com/blog/ransomware-statistics/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK
Jan 22
Eyal Estrin
Jan 22
Zendesk ticket systems hijacked in massive global spam wave
https://www.bleepingcomputer.com/news/security/zendesk-ticket-systems-hijacked-in-massive-global-spam
unread,
Zendesk ticket systems hijacked in massive global spam wave
https://www.bleepingcomputer.com/news/security/zendesk-ticket-systems-hijacked-in-massive-global-spam
Jan 22
Eyal Estrin
Jan 22
Kimwolf Botnet Lurking in Corporate, Govt. Networks
https://krebsonsecurity.com/2026/01/kimwolf-botnet-lurking-in-corporate-govt-networks/ Eyal Estrin
unread,
Kimwolf Botnet Lurking in Corporate, Govt. Networks
https://krebsonsecurity.com/2026/01/kimwolf-botnet-lurking-in-corporate-govt-networks/ Eyal Estrin
Jan 22
Eyal Estrin
Jan 22
Open-Source Python Script Drives Social Media Phishing Campaign
https://reliaquest.com/blog/threat-spotlight-open-source-python-script-drives-social-media-phishing-
unread,
Open-Source Python Script Drives Social Media Phishing Campaign
https://reliaquest.com/blog/threat-spotlight-open-source-python-script-drives-social-media-phishing-
Jan 22
Eyal Estrin
Jan 22
Common Facebook Scam Method
https://www.linkedin.com/pulse/common-facebook-scam-method-roger-grimes-pr4be/ Eyal Estrin CISSP,
unread,
Common Facebook Scam Method
https://www.linkedin.com/pulse/common-facebook-scam-method-roger-grimes-pr4be/ Eyal Estrin CISSP,
Jan 22
Eyal Estrin
Jan 22
From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers
https://www.trendmicro.com/en_us/research/26/a/analysis-of-the-evelyn-stealer-campaign.html Eyal
unread,
From Extension to Infection: An In-Depth Analysis of the Evelyn Stealer Campaign Targeting Software Developers
https://www.trendmicro.com/en_us/research/26/a/analysis-of-the-evelyn-stealer-campaign.html Eyal
Jan 22
Eyal Estrin
Jan 22
You Got Phished? Of Course! You're Human...
https://www.bleepingcomputer.com/news/security/you-got-phished-of-course-youre-human/ Eyal Estrin
unread,
You Got Phished? Of Course! You're Human...
https://www.bleepingcomputer.com/news/security/you-got-phished-of-course-youre-human/ Eyal Estrin
Jan 22
Eyal Estrin
Jan 20
PDFSIDER Malware - Exploitation of DLL Side-Loading for AV and EDR Evasion
https://www.resecurity.com/es/blog/article/pdfsider-malware-exploitation-of-dll-side-loading-for-av-
unread,
PDFSIDER Malware - Exploitation of DLL Side-Loading for AV and EDR Evasion
https://www.resecurity.com/es/blog/article/pdfsider-malware-exploitation-of-dll-side-loading-for-av-
Jan 20
Eyal Estrin
Jan 20
Operation Poseidon: Spear-Phishing Attacks Abusing Google Ads Redirection Mechanisms
https://www.genians.co.kr/en/blog/threat_intelligence/spear-phishing Eyal Estrin CISSP, CCSP, CISM,
unread,
Operation Poseidon: Spear-Phishing Attacks Abusing Google Ads Redirection Mechanisms
https://www.genians.co.kr/en/blog/threat_intelligence/spear-phishing Eyal Estrin CISSP, CCSP, CISM,
Jan 20
Eyal Estrin
Jan 17
New PayPal Scam Sends Verified Invoices With Fake Support Numbers
https://hackread.com/paypal-scam-verified-invoices-fake-support-numbers/ Eyal Estrin CISSP, CCSP,
unread,
New PayPal Scam Sends Verified Invoices With Fake Support Numbers
https://hackread.com/paypal-scam-verified-invoices-fake-support-numbers/ Eyal Estrin CISSP, CCSP,
Jan 17
Eyal Estrin
Jan 17
UAT-8837 targets critical infrastructure sectors in North America
https://blog.talosintelligence.com/uat-8837/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog:
unread,
UAT-8837 targets critical infrastructure sectors in North America
https://blog.talosintelligence.com/uat-8837/ Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog:
Jan 17
Eyal Estrin
Jan 16
Sicarii Ransomware: Truth vs Myth
https://research.checkpoint.com/2026/sicarii-ransomware-truth-vs-myth/ Eyal Estrin CISSP, CCSP, CISM,
unread,
Sicarii Ransomware: Truth vs Myth
https://research.checkpoint.com/2026/sicarii-ransomware-truth-vs-myth/ Eyal Estrin CISSP, CCSP, CISM,
Jan 16
Eyal Estrin
Jan 16
DeadLock Ransomware: Smart Contracts for Malicious Purposes
https://www.group-ib.com/blog/deadlock-ransomware-polygon-smart-contracts/ Eyal Estrin CISSP, CCSP,
unread,
DeadLock Ransomware: Smart Contracts for Malicious Purposes
https://www.group-ib.com/blog/deadlock-ransomware-polygon-smart-contracts/ Eyal Estrin CISSP, CCSP,
Jan 16
Eyal Estrin
Jan 14
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/ Eyal Estrin CISSP,
unread,
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
https://research.checkpoint.com/2026/voidlink-the-cloud-native-malware-framework/ Eyal Estrin CISSP,
Jan 14
Eyal Estrin
Jan 14
Malware Intercepts Googlebot via IP-Verified Conditional Logic
https://blog.sucuri.net/2026/01/malware-intercepts-googlebot-via-ip-verified-conditional-logic.html
unread,
Malware Intercepts Googlebot via IP-Verified Conditional Logic
https://blog.sucuri.net/2026/01/malware-intercepts-googlebot-via-ip-verified-conditional-logic.html
Jan 14
Eyal Estrin
Jan 14
Convincing LinkedIn comment-reply tactic used in new phishing
https://www.bleepingcomputer.com/news/security/convincing-linkedin-comment-reply-tactic-used-in-new-
unread,
Convincing LinkedIn comment-reply tactic used in new phishing
https://www.bleepingcomputer.com/news/security/convincing-linkedin-comment-reply-tactic-used-in-new-
Jan 14
Eyal Estrin
Jan 14
Fake Employee Reports Spread Guloader and Remcos RAT Malware
https://hackread.com/fake-employee-reports-guloader-remcos-rat-malware/ Eyal Estrin CISSP, CCSP, CISM
unread,
Fake Employee Reports Spread Guloader and Remcos RAT Malware
https://hackread.com/fake-employee-reports-guloader-remcos-rat-malware/ Eyal Estrin CISSP, CCSP, CISM
Jan 14
Eyal Estrin
Jan 13
The Unfriending Truth: How to Spot a Facebook Phishing Scam Before It's Too Late
https://www.trellix.com/en-au/blogs/research/the-unfriending-truth-how-to-spot-a-facebook-phishing-
unread,
The Unfriending Truth: How to Spot a Facebook Phishing Scam Before It's Too Late
https://www.trellix.com/en-au/blogs/research/the-unfriending-truth-how-to-spot-a-facebook-phishing-
Jan 13
Eyal Estrin
Jan 10
North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing Campaigns Targeting U.S. Entities
https://www.ic3.gov/CSA/2026/260108.pdf Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog: https:
unread,
North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing Campaigns Targeting U.S. Entities
https://www.ic3.gov/CSA/2026/260108.pdf Eyal Estrin CISSP, CCSP, CISM, CISA, CDPSE, CCSK Blog: https:
Jan 10
Eyal Estrin
Jan 10
Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns
https://research.checkpoint.com/2026/inside-gobruteforcer-ai-generated-server-defaults-weak-passwords
unread,
Inside GoBruteforcer: AI-Generated Server Defaults, Weak Passwords, and Crypto-Focused Campaigns
https://research.checkpoint.com/2026/inside-gobruteforcer-ai-generated-server-defaults-weak-passwords
Jan 10
Eyal Estrin
Jan 8
Ghost Tapped: Tracking the Rise of Chinese Tap-to-pay Android Malware
https://www.group-ib.com/blog/ghost-tapped-chinese-malware/ Eyal Estrin CISSP, CCSP, CISM, CISA,
unread,
Ghost Tapped: Tracking the Rise of Chinese Tap-to-pay Android Malware
https://www.group-ib.com/blog/ghost-tapped-chinese-malware/ Eyal Estrin CISSP, CCSP, CISM, CISA,
Jan 8
Eyal Estrin
Jan 7
Phishing campaign abuses Google Cloud services to steal Microsoft 365 logins
https://www.malwarebytes.com/blog/news/2026/01/phishing-campaign-abuses-google-cloud-services-to-
unread,
Phishing campaign abuses Google Cloud services to steal Microsoft 365 logins
https://www.malwarebytes.com/blog/news/2026/01/phishing-campaign-abuses-google-cloud-services-to-
Jan 7
Eyal Estrin
Jan 3
APT36 LNK-BASED MALWARE CAMPAIGN LEVERAGING MSI PAYLOAD DELIVERY
https://www.cyfirma.com/research/apt36-lnk-based-malware-campaign-leveraging-msi-payload-delivery/
unread,
APT36 LNK-BASED MALWARE CAMPAIGN LEVERAGING MSI PAYLOAD DELIVERY
https://www.cyfirma.com/research/apt36-lnk-based-malware-campaign-leveraging-msi-payload-delivery/
Jan 3
Eyal Estrin
Jan 3
GlassWorm Goes Mac: Fresh Infrastructure, New Tricks
https://www.koi.ai/blog/glassworm-goes-mac-fresh-infrastructure-new-tricks Eyal Estrin CISSP, CCSP,
unread,
GlassWorm Goes Mac: Fresh Infrastructure, New Tricks
https://www.koi.ai/blog/glassworm-goes-mac-fresh-infrastructure-new-tricks Eyal Estrin CISSP, CCSP,
Jan 3
Eyal Estrin
Jan 3
Phishing Campaign Leverages Trusted Google Cloud Automation Capabilities to Evade Detection
https://blog.checkpoint.com/research/phishing-campaign-leverages-trusted-google-cloud-automation-
unread,
Phishing Campaign Leverages Trusted Google Cloud Automation Capabilities to Evade Detection
https://blog.checkpoint.com/research/phishing-campaign-leverages-trusted-google-cloud-automation-
Jan 3