惯性聚合 高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文 在惯性聚合中打开

推荐订阅源

Google DeepMind News
Google DeepMind News
F
Fortinet All Blogs
阮一峰的网络日志
阮一峰的网络日志
Apple Machine Learning Research
Apple Machine Learning Research
爱范儿
爱范儿
WordPress大学
WordPress大学
让小产品的独立变现更简单 - ezindie.com
让小产品的独立变现更简单 - ezindie.com
J
Java Code Geeks
罗磊的独立博客
S
SegmentFault 最新的问题
V
V2EX
V
Visual Studio Blog
钛媒体:引领未来商业与生活新知
钛媒体:引领未来商业与生活新知
美团技术团队
博客园 - 三生石上(FineUI控件)
Stack Overflow Blog
Stack Overflow Blog
Y
Y Combinator Blog
MyScale Blog
MyScale Blog
D
Docker
Google DeepMind News
Google DeepMind News
Blog — PlanetScale
Blog — PlanetScale
M
Microsoft Research Blog - Microsoft Research
Martin Fowler
Martin Fowler
S
Secure Thoughts
B
Blog
cs.CL updates on arXiv.org
cs.CL updates on arXiv.org
www.infosecurity-magazine.com
www.infosecurity-magazine.com
Recent Announcements
Recent Announcements
MongoDB | Blog
MongoDB | Blog
C
Cisco Blogs
C
CERT Recently Published Vulnerability Notes
T
True Tiger Recordings
GbyAI
GbyAI
P
Proofpoint News Feed
P
Privacy International News Feed
Jina AI
Jina AI
The Cloudflare Blog
I
Intezer
AWS News Blog
AWS News Blog
Hacker News - Newest:
Hacker News - Newest: "LLM"
S
Security Archives - TechRepublic
NISL@THU
NISL@THU
The Register - Security
The Register - Security
Recent Commits to openclaw:main
Recent Commits to openclaw:main
P
Palo Alto Networks Blog
S
Schneier on Security
L
LINUX DO - 热门话题
C
CXSECURITY Database RSS Feed - CXSecurity.com
Security Latest
Security Latest
C
Cybersecurity and Infrastructure Security Agency CISA

Malpedia Library (Latest)

BPFdoor in Telecom Networks: Sleeper Cells in the Backbone Deep Technical Analysis Of Payload Ransomware Targeting ESXi Environment MacOS hacking part 13: sysinfo stealer via VirusTotal API. Simple C example AA26-097A: Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure APT28 exploit routers to enable DNS hijacking operations FrostArmada: All thriller, no (malware) filler ProxyBox: Socks5Systemz Lives On North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack Remus: Unmasking The 64-bit Variant of the Infamous Lumma Stealer SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks Active Magecart Campaign Targets Spain, Steals Card Data via Hijacked eStores for Bank Fraud MacOS malware persistence 5: cron jobs. Simple C example MacOS malware persistence 6: PAM module injection. Simple C example Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets I-032026-PSA: Russian Intelligence Services Target Commercial Messaging Application Accounts NICKEL ALLEY strategy: Fake it ‘til you make it Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide RegPhantom Backdoor Threat Analysis MacOS malware persistence 7: Re-opened applications. Simple C example Kazuar: Anatomy of a nation-state botnet LATAM Under Siege: Agent Tesla’s 18-Month Credential Theft Campaign Against Chilean Enterprises Analysis on Malware that attacks Israel's Water treatment facilities Multi-stage malware delivery campaign using SEO poisoning and serverless infrastructure Where Have All the Complex Windows Malware and Their Analyses Gone? Weekly Detected Threats - April 21 - April 27 2026 Hunting Lazarus Part VII: The Server That Was Not Just FTP GopherWhisper: A burrow full of malware UAT-8302 and its box full of malware North Korea's abuse of Cloudflare Workers and Pages NotPetya Malware Analysis - Bye, boot partition. I'll miss you Payload Ransomware: In-depth technical analysis Tweet about LedgerChecker Stealer New TrickMo Variant: Device Take Over malware targeting Banking, Fintech, Wallet & Auth apps New Phishing Campaign Targets US with Credential Theft: What CISOs Need to Know Zynap’s Next-Gen Sandbox Redefines Automatic Malware Analysis X.com - Gen Threat Labs - AuraStealer (version 1.8.0) FrostyNeighbor: Fresh mischief and digital shenanigans Tweet about Lalia Ransomware Darcula aka. "Magic Cat" OpenClaw hologram: Fake installer ships Rust Infostealer TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook Payload Ransomware: In-depth technical analysis Lorem Ipsum Malware: Trojanized MS Teams Installers Deliver Multi-Stage Loader and Backdoor THUS SPOKE…THE GENTLEMEN MustangPanda New Backdoor LotusLite Mobile malware development trick 3. CPU info logger: anti-VM and anti-sandbox. Simple Android (Kotlin) example. Google Cloud Storage Phishing Deploying Remcos RAT a new Android RAT turning infected devices into potential residential proxy nodes MUSTANG PANDA × PLUGX - From deceptive LNK to multi-transport backdoor MacOS malware persistence 10: caffeinate LOLBin. Simple C example Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite Inside Lazarus: How North Korea uses AI to industrialize attacks on developers When Malware Authors Study Algebra: The Group Theory Inside Bedep's DGA Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories WannaCry Malware Analysis - How YOU Could have Saved the World Cloned, Loaded, and Stolen: How 109 Fake GitHub Repositories Delivered SmartLoader and StealC Inside ZionSiphon: Darktrace’s Analysis of OT Malware Targeting Israeli Water Systems Smoking Out an Affiliate: SmokedHam, Qilin, a few Google Ads and some Bossware Smoking Out an Affiliate: SmokedHam, Qilin, a few Google ads and some bossware Tweet about VoltStealer We Dumped a Live Kimsuky C2 and Recovered Every Stage of the Kill Chain: CHM Dropper, VBScript Stager, PowerShell Keylogger Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities Exclusive: Krybit hackers claim breach of New Zealand IT services provider [KRYBIT] – Ransomware Victim: Hacked 0APT Cyber Intel Brief: Pro-Iranian Actor Ababil of Minab Claims Cyberattack on LA Metro (LACMTA) Scams, Slaves and (Malware-as-a) Service: Tracking a Trojan to Cambodia’s Scam Centers Lazarus Group Uses Git Hooks To Hide Malware Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet Tweet about SpankRat Tweet about HanGhost Tweet about GeckoStealer
MacOS malware persistence 11: osascript LOLBin. Simple C example
2026-05-18 · via Malpedia Library (Latest)
2026-04-27 • cocomelonc • cocomelonc • osx.osaminer Open article on Malpedia