惯性聚合
高效追踪和阅读你感兴趣的博客、新闻、科技资讯
阅读原文
在惯性聚合中打开
即将跳转到惯性聚合
3
在聚合应用中查看完整内容和互动
立即跳转
取消
推荐订阅源
Google DeepMind News
F
Fortinet All Blogs
阮一峰的网络日志
Apple Machine Learning Research
爱范儿
WordPress大学
让小产品的独立变现更简单 - ezindie.com
J
Java Code Geeks
罗
罗磊的独立博客
S
SegmentFault 最新的问题
V
V2EX
V
Visual Studio Blog
钛媒体:引领未来商业与生活新知
美
美团技术团队
博
博客园 - 三生石上(FineUI控件)
Stack Overflow Blog
Y
Y Combinator Blog
MyScale Blog
D
Docker
Google DeepMind News
Blog — PlanetScale
M
Microsoft Research Blog - Microsoft Research
Martin Fowler
S
Secure Thoughts
B
Blog
cs.CL updates on arXiv.org
www.infosecurity-magazine.com
Recent Announcements
MongoDB | Blog
C
Cisco Blogs
C
CERT Recently Published Vulnerability Notes
T
True Tiger Recordings
GbyAI
P
Proofpoint News Feed
P
Privacy International News Feed
Jina AI
The Cloudflare Blog
I
Intezer
AWS News Blog
Hacker News - Newest: "LLM"
S
Security Archives - TechRepublic
NISL@THU
The Register - Security
Recent Commits to openclaw:main
P
Palo Alto Networks Blog
S
Schneier on Security
L
LINUX DO - 热门话题
C
CXSECURITY Database RSS Feed - CXSecurity.com
Security Latest
C
Cybersecurity and Infrastructure Security Agency CISA
Malpedia Library (Latest)
BPFdoor in Telecom Networks: Sleeper Cells in the Backbone
Deep Technical Analysis Of Payload Ransomware Targeting ESXi Environment
MacOS hacking part 13: sysinfo stealer via VirusTotal API. Simple C example
AA26-097A: Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
APT28 exploit routers to enable DNS hijacking operations
FrostArmada: All thriller, no (malware) filler
ProxyBox: Socks5Systemz Lives On
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
Remus: Unmasking The 64-bit Variant of the Infamous Lumma Stealer
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
Active Magecart Campaign Targets Spain, Steals Card Data via Hijacked eStores for Bank Fraud
MacOS malware persistence 5: cron jobs. Simple C example
MacOS malware persistence 6: PAM module injection. Simple C example
Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets
I-032026-PSA: Russian Intelligence Services Target Commercial Messaging Application Accounts
NICKEL ALLEY strategy: Fake it ‘til you make it
Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module
Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide
RegPhantom Backdoor Threat Analysis
MacOS malware persistence 7: Re-opened applications. Simple C example
Kazuar: Anatomy of a nation-state botnet
LATAM Under Siege: Agent Tesla’s 18-Month Credential Theft Campaign Against Chilean Enterprises
Analysis on Malware that attacks Israel's Water treatment facilities
Multi-stage malware delivery campaign using SEO poisoning and serverless infrastructure
Where Have All the Complex Windows Malware and Their Analyses Gone?
Weekly Detected Threats - April 21 - April 27 2026
Hunting Lazarus Part VII: The Server That Was Not Just FTP
GopherWhisper: A burrow full of malware
UAT-8302 and its box full of malware
North Korea's abuse of Cloudflare Workers and Pages
NotPetya Malware Analysis - Bye, boot partition. I'll miss you
Payload Ransomware: In-depth technical analysis
Tweet about LedgerChecker Stealer
New TrickMo Variant: Device Take Over malware targeting Banking, Fintech, Wallet & Auth apps
New Phishing Campaign Targets US with Credential Theft: What CISOs Need to Know
Zynap’s Next-Gen Sandbox Redefines Automatic Malware Analysis
X.com - Gen Threat Labs - AuraStealer (version 1.8.0)
FrostyNeighbor: Fresh mischief and digital shenanigans
Tweet about Lalia Ransomware
Darcula aka. "Magic Cat"
OpenClaw hologram: Fake installer ships Rust Infostealer
TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook
Payload Ransomware: In-depth technical analysis
Lorem Ipsum Malware: Trojanized MS Teams Installers Deliver Multi-Stage Loader and Backdoor
THUS SPOKE…THE GENTLEMEN
MustangPanda New Backdoor LotusLite
Mobile malware development trick 3. CPU info logger: anti-VM and anti-sandbox. Simple Android (Kotlin) example.
Google Cloud Storage Phishing Deploying Remcos RAT
a new Android RAT turning infected devices into potential residential proxy nodes
MUSTANG PANDA × PLUGX - From deceptive LNK to multi-transport backdoor
MacOS malware persistence 10: caffeinate LOLBin. Simple C example
Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
Inside Lazarus: How North Korea uses AI to industrialize attacks on developers
When Malware Authors Study Algebra: The Group Theory Inside Bedep's DGA
Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories
WannaCry Malware Analysis - How YOU Could have Saved the World
Cloned, Loaded, and Stolen: How 109 Fake GitHub Repositories Delivered SmartLoader and StealC
Inside ZionSiphon: Darktrace’s Analysis of OT Malware Targeting Israeli Water Systems
Smoking Out an Affiliate: SmokedHam, Qilin, a few Google Ads and some Bossware
Smoking Out an Affiliate: SmokedHam, Qilin, a few Google ads and some bossware
Tweet about VoltStealer
We Dumped a Live Kimsuky C2 and Recovered Every Stage of the Kill Chain: CHM Dropper, VBScript Stager, PowerShell Keylogger
Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities
Exclusive: Krybit hackers claim breach of New Zealand IT services provider
[KRYBIT] – Ransomware Victim: Hacked 0APT
Cyber Intel Brief: Pro-Iranian Actor Ababil of Minab Claims Cyberattack on LA Metro (LACMTA)
Scams, Slaves and (Malware-as-a) Service: Tracking a Trojan to Cambodia’s Scam Centers
Lazarus Group Uses Git Hooks To Hide Malware
Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India
fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
Tweet about SpankRat
Tweet about HanGhost
Tweet about GeckoStealer
MacOS malware persistence 11: osascript LOLBin. Simple C example
2026-05-18
·
via
Malpedia Library (Latest)
2026-04-27 • cocomelonc • cocomelonc • osx.osaminer Open article on Malpedia
此内容由惯性聚合(RSS阅读器)自动聚合整理,仅供阅读参考。
原文来自
— 版权归原作者所有。