Groups
Groups
Sign in
Groups
Groups
Technical - Malware
Conversations
About
Send feedback
Help
Technical - Malware
1–30 of 8759
Mark all as read
Report group
0 selected
Eyal Estrin
Mar 26
StoatWaffle, malware used by WaterPlum
https://jp.security.ntt/insights_resources/tech_blog/stoatwaffle_malware_en/ Eyal Estrin Author |
unread,
StoatWaffle, malware used by WaterPlum
https://jp.security.ntt/insights_resources/tech_blog/stoatwaffle_malware_en/ Eyal Estrin Author |
Mar 26
Eyal Estrin
Mar 26
Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse
https://thehackernews.com/2026/03/device-code-phishing-hits-340-microsoft.html https://github.com/
unread,
Device Code Phishing Hits 340+ Microsoft 365 Orgs Across Five Countries via OAuth Abuse
https://thehackernews.com/2026/03/device-code-phishing-hits-340-microsoft.html https://github.com/
Mar 26
Eyal Estrin
Mar 26
Bubble: a new tool for phishing scams
https://www.kaspersky.com/blog/bubble-no-code-phishing/55488/ Eyal Estrin Author | Cloud Architect |
unread,
Bubble: a new tool for phishing scams
https://www.kaspersky.com/blog/bubble-no-code-phishing/55488/ Eyal Estrin Author | Cloud Architect |
Mar 26
Eyal Estrin
Mar 26
Widespread GitHub Campaign Uses Fake VS Code Security Alerts to Deliver Malware
https://socket.dev/blog/widespread-github-campaign-uses-fake-vs-code-security-alerts-to-deliver-
unread,
Widespread GitHub Campaign Uses Fake VS Code Security Alerts to Deliver Malware
https://socket.dev/blog/widespread-github-campaign-uses-fake-vs-code-security-alerts-to-deliver-
Mar 26
Eyal Estrin
Mar 25
Monitoring Cyberattacks Directly Linked to the US-Israel-Iran Military Conflict
https://flare.io/learn/resources/blog/cyberattacks-us-israel-iran-military-conflict Eyal Estrin
unread,
Monitoring Cyberattacks Directly Linked to the US-Israel-Iran Military Conflict
https://flare.io/learn/resources/blog/cyberattacks-us-israel-iran-military-conflict Eyal Estrin
Mar 25
Eyal Estrin
Mar 23
iPhone spyware is everyone's problem now
https://www.axios.com/2026/03/21/iphone-spyware-is-everyones-problem-now Eyal Estrin Author | Cloud
unread,
iPhone spyware is everyone's problem now
https://www.axios.com/2026/03/21/iphone-spyware-is-everyones-problem-now Eyal Estrin Author | Cloud
Mar 23
Eyal Estrin
Mar 23
Microsoft retires endpoint sensitive data alerting in Defender today
https://www.neowin.net/news/microsoft-retires-endpoint-sensitive-data-alerting-in-defender-today/
unread,
Microsoft retires endpoint sensitive data alerting in Defender today
https://www.neowin.net/news/microsoft-retires-endpoint-sensitive-data-alerting-in-defender-today/
Mar 23
Eyal Estrin
Mar 21
Technical Analysis of SnappyClient
https://www.zscaler.com/blogs/security-research/technical-analysis-snappyclient Eyal Estrin Author |
unread,
Technical Analysis of SnappyClient
https://www.zscaler.com/blogs/security-research/technical-analysis-snappyclient Eyal Estrin Author |
Mar 21
Eyal Estrin
Mar 21
The Beast Returns: Analysis of a Beast Ransomware Server
https://www.team-cymru.com/post/beast-ransomware-server-toolkit-analysis Eyal Estrin Author | Cloud
unread,
The Beast Returns: Analysis of a Beast Ransomware Server
https://www.team-cymru.com/post/beast-ransomware-server-toolkit-analysis Eyal Estrin Author | Cloud
Mar 21
Eyal Estrin
Mar 21
Vidar Stealer 2.0 distributed via fake game cheats on GitHub and Reddit
https://www.acronis.com/en/tru/posts/vidar-stealer-20-distributed-via-fake-game-cheats-on-github-and-
unread,
Vidar Stealer 2.0 distributed via fake game cheats on GitHub and Reddit
https://www.acronis.com/en/tru/posts/vidar-stealer-20-distributed-via-fake-game-cheats-on-github-and-
Mar 21
Eyal Estrin
Mar 21
Hasta la vista, Hastalamuerte: An Overview of The Gentlemen's TTPs
https://www.group-ib.com/blog/hastalamuerte-gentlemen-raas-ttps/ Eyal Estrin Author | Cloud Architect
unread,
Hasta la vista, Hastalamuerte: An Overview of The Gentlemen's TTPs
https://www.group-ib.com/blog/hastalamuerte-gentlemen-raas-ttps/ Eyal Estrin Author | Cloud Architect
Mar 21
Eyal Estrin
Mar 21
When tax season becomes cyberattack season: Phishing and malware campaigns using tax-related lures
https://www.microsoft.com/en-us/security/blog/2026/03/19/when-tax-season-becomes-cyberattack-season-
unread,
When tax season becomes cyberattack season: Phishing and malware campaigns using tax-related lures
https://www.microsoft.com/en-us/security/blog/2026/03/19/when-tax-season-becomes-cyberattack-season-
Mar 21
Eyal Estrin
Mar 21
Perseus: DTO malware that takes notes
https://www.threatfabric.com/blogs/perseus-dto-malware-that-takes-notes Eyal Estrin Author | Cloud
unread,
Perseus: DTO malware that takes notes
https://www.threatfabric.com/blogs/perseus-dto-malware-that-takes-notes Eyal Estrin Author | Cloud
Mar 21
Eyal Estrin
Mar 20
Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls
https://aws.amazon.com/blogs/security/amazon-threat-intelligence-teams-identify-interlock-ransomware-
unread,
Amazon threat intelligence teams identify Interlock ransomware campaign targeting enterprise firewalls
https://aws.amazon.com/blogs/security/amazon-threat-intelligence-teams-identify-interlock-ransomware-
Mar 20
Eyal Estrin
Mar 20
Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
https://www.sentinelone.com/labs/building-an-adversarial-consensus-engine-multi-agent-llms-for-
unread,
Building an Adversarial Consensus Engine | Multi-Agent LLMs for Automated Malware Analysis
https://www.sentinelone.com/labs/building-an-adversarial-consensus-engine-multi-agent-llms-for-
Mar 20
Eyal Estrin
Mar 20
EDR killers explained: Beyond the drivers
https://www.welivesecurity.com/en/eset-research/edr-killers-explained-beyond-the-drivers/ Eyal Estrin
unread,
EDR killers explained: Beyond the drivers
https://www.welivesecurity.com/en/eset-research/edr-killers-explained-beyond-the-drivers/ Eyal Estrin
Mar 20
Eyal Estrin
Mar 20
Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/ Eyal Estrin
unread,
Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
https://krebsonsecurity.com/2026/03/feds-disrupt-iot-botnets-behind-huge-ddos-attacks/ Eyal Estrin
Mar 20
Eyal Estrin
Mar 20
Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape
https://cloud.google.com/blog/topics/threat-intelligence/ransomware-ttps-shifting-threat-landscape
unread,
Ransomware Under Pressure: Tactics, Techniques, and Procedures in a Shifting Threat Landscape
https://cloud.google.com/blog/topics/threat-intelligence/ransomware-ttps-shifting-threat-landscape
Mar 20
Eyal Estrin
Mar 19
Inside a network of 20,000+ fake shops
https://www.malwarebytes.com/blog/scams/2026/03/inside-a-network-of-20000-fake-shops Eyal Estrin
unread,
Inside a network of 20,000+ fake shops
https://www.malwarebytes.com/blog/scams/2026/03/inside-a-network-of-20000-fake-shops Eyal Estrin
Mar 19
Eyal Estrin
Mar 19
Inside DarkSword: A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites
https://iverify.io/blog/darksword-ios-exploit-kit-explained Eyal Estrin Author | Cloud Architect |
unread,
Inside DarkSword: A New iOS Exploit Kit Delivered Via Compromised Legitimate Websites
https://iverify.io/blog/darksword-ios-exploit-kit-explained Eyal Estrin Author | Cloud Architect |
Mar 19
Eyal Estrin
Mar 18
Analysis of the Spear-Phishing and KakaoTalk-Linked Threat Campaign by the Konni Group
https://www.genians.co.kr/en/blog/threat_intelligence/kakaotalk Eyal Estrin Author | Cloud Architect
unread,
Analysis of the Spear-Phishing and KakaoTalk-Linked Threat Campaign by the Konni Group
https://www.genians.co.kr/en/blog/threat_intelligence/kakaotalk Eyal Estrin Author | Cloud Architect
Mar 18
Eyal Estrin
Mar 18
GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSX
https://www.bleepingcomputer.com/news/security/glassworm-malware-hits-400-plus-code-repos-on-github-
unread,
GlassWorm malware hits 400+ code repos on GitHub, npm, VSCode, OpenVSX
https://www.bleepingcomputer.com/news/security/glassworm-malware-hits-400-plus-code-repos-on-github-
Mar 18
Eyal Estrin
Mar 13
A Slopoly start to AI-enhanced ransomware attacks
https://www.ibm.com/think/x-force/slopoly-start-ai-enhanced-ransomware-attacks Eyal Estrin Author |
unread,
A Slopoly start to AI-enhanced ransomware attacks
https://www.ibm.com/think/x-force/slopoly-start-ai-enhanced-ransomware-attacks Eyal Estrin Author |
Mar 13
Eyal Estrin
Mar 13
Contagious Interview: Malware delivered through fake developer job interviews
https://www.microsoft.com/en-us/security/blog/2026/03/11/contagious-interview-malware-delivered-
unread,
Contagious Interview: Malware delivered through fake developer job interviews
https://www.microsoft.com/en-us/security/blog/2026/03/11/contagious-interview-malware-delivered-
Mar 13
Eyal Estrin
Mar 13
BeatBanker: A dual‑mode Android Trojan
https://securelist.com/beatbanker-miner-and-banker/119121/ Eyal Estrin Author | Cloud Architect | AWS
unread,
BeatBanker: A dual‑mode Android Trojan
https://securelist.com/beatbanker-miner-and-banker/119121/ Eyal Estrin Author | Cloud Architect | AWS
Mar 13
Eyal Estrin
Mar 13
US disrupts SocksEscort proxy network powered by Linux malware
https://www.bleepingcomputer.com/news/security/us-disrupts-socksescort-proxy-network-powered-by-linux
unread,
US disrupts SocksEscort proxy network powered by Linux malware
https://www.bleepingcomputer.com/news/security/us-disrupts-socksescort-proxy-network-powered-by-linux
Mar 13
Eyal Estrin
Mar 13
When Trust Becomes the Attack Vector: Analysis of the EmEditor Supply-Chain Compromise
https://techcommunity.microsoft.com/blog/microsoftsecurityexperts/when-trust-becomes-the-attack-
unread,
When Trust Becomes the Attack Vector: Analysis of the EmEditor Supply-Chain Compromise
https://techcommunity.microsoft.com/blog/microsoftsecurityexperts/when-trust-becomes-the-attack-
Mar 13
Eyal Estrin
Mar 12
Silence of the hops: The KadNap botnet
https://blog.lumen.com/silence-of-the-hops-the-kadnap-botnet/ https://pdos.csail.mit.edu/~petar/
unread,
Silence of the hops: The KadNap botnet
https://blog.lumen.com/silence-of-the-hops-the-kadnap-botnet/ https://pdos.csail.mit.edu/~petar/
Mar 12
Eyal Estrin
Mar 12
2026 Phishing Trends Report
https://hoxhunt.com/guide/phishing-trends-report Eyal Estrin Author | Cloud Architect | AWS • Azure •
unread,
2026 Phishing Trends Report
https://hoxhunt.com/guide/phishing-trends-report Eyal Estrin Author | Cloud Architect | AWS • Azure •
Mar 12
Eyal Estrin
Mar 12
New Malware Approaches, Same Key Indicators
https://orca.security/resources/blog/ai-malware-detection-runtime-visibility/ Eyal Estrin Author |
unread,
New Malware Approaches, Same Key Indicators
https://orca.security/resources/blog/ai-malware-detection-runtime-visibility/ Eyal Estrin Author |
Mar 12