Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
malware
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Malware-Based Attacks: The Undying Threat of the Computer Virus
Peter Nasarah Dashe
Peter Nasarah Dashe
Peter Nasarah Dashe
Follow
Apr 14
Malware-Based Attacks: The Undying Threat of the Computer Virus
#
cybersecurity
#
malware
#
infosec
#
incidentresponse
Comments
Add Comment
5 min read
A firefox extension .xpi malware scanner python script and live malware examples.
Maximilian Cornett
Maximilian Cornett
Maximilian Cornett
Follow
Apr 10
A firefox extension .xpi malware scanner python script and live malware examples.
#
malwareanalysis
#
malware
#
cybersecurity
#
firefox
Comments
Add Comment
1 min read
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack
Excalibra
Excalibra
Excalibra
Follow
Apr 13
Kimsuky Deploys Malicious LNK Files to Implant Python-Based Backdoor in Multi-Stage Attack
#
malware
#
vulnerabilities
#
redteam
#
cybersecurity
5
 reactions
Comments
Add Comment
6 min read
Malicious Code Hidden in Build Config Files Exploits Trust in PRs: Enhanced Scrutiny and Automated Checks Proposed
Pavel Kostromin
Pavel Kostromin
Pavel Kostromin
Follow
Apr 9
Malicious Code Hidden in Build Config Files Exploits Trust in PRs: Enhanced Scrutiny and Automated Checks Proposed
#
security
#
malware
#
opensource
#
obfuscation
Comments
Add Comment
11 min read
Malicious PyPI Package Squatting: AGPL-3.0 Violations and Reputation Attacks Addressed with Legal and Community Action
Roman Dubrovin
Roman Dubrovin
Roman Dubrovin
Follow
Apr 7
Malicious PyPI Package Squatting: AGPL-3.0 Violations and Reputation Attacks Addressed with Legal and Community Action
#
pypi
#
agpl30
#
malware
#
opensource
Comments
Add Comment
9 min read
CVE-2026-34208: JavaScript Sandbox Library Can't Keep Attackers Out
THREAT CHAIN
THREAT CHAIN
THREAT CHAIN
Follow
Apr 7
CVE-2026-34208: JavaScript Sandbox Library Can't Keep Attackers Out
#
security
#
malware
#
cybersecurity
#
cve202634208
Comments
Add Comment
3 min read
That Fake Purchase Order in Your Inbox? It Might Be Formbook Stealing Every Keystroke You Type
THREAT CHAIN
THREAT CHAIN
THREAT CHAIN
Follow
Apr 7
That Fake Purchase Order in Your Inbox? It Might Be Formbook Stealing Every Keystroke You Type
#
security
#
malware
#
cybersecurity
#
formbook
Comments
Add Comment
6 min read
Claude Code Source Leak: How One Packaging Mistake Created a Hacker Feeding Frenzy
THREAT CHAIN
THREAT CHAIN
THREAT CHAIN
Follow
Apr 6
Claude Code Source Leak: How One Packaging Mistake Created a Hacker Feeding Frenzy
#
security
#
malware
#
cybersecurity
#
supplychainattack
Comments
Add Comment
6 min read
Inside OffLoader: A GCleaner-Dropped Payload Slipping Past 95% of AV Engines
THREAT CHAIN
THREAT CHAIN
THREAT CHAIN
Follow
Apr 4
Inside OffLoader: A GCleaner-Dropped Payload Slipping Past 95% of AV Engines
#
security
#
malware
#
cybersecurity
#
offloader
Comments
Add Comment
7 min read
Malicious npm Packages Disguised as Strapi Plugins Enable Data Exfiltration and Remote Code Execution
Artyom Kornilov
Artyom Kornilov
Artyom Kornilov
Follow
Apr 4
Malicious npm Packages Disguised as Strapi Plugins Enable Data Exfiltration and Remote Code Execution
#
npm
#
strapi
#
malware
#
exfiltration
Comments
Add Comment
7 min read
A laughing RAT: CrystalX combines spyware, stealer, and prankware features
Mark0
Mark0
Mark0
Follow
Apr 2
A laughing RAT: CrystalX combines spyware, stealer, and prankware features
#
cybersecurity
#
infosec
#
malware
#
crystalx
Comments
Add Comment
1 min read
npm's Implicit Dependency Execution Exposes Users to Security Risks: Explicit Confirmation Needed
Marina Kovalchuk
Marina Kovalchuk
Marina Kovalchuk
Follow
Apr 1
npm's Implicit Dependency Execution Exposes Users to Security Risks: Explicit Confirmation Needed
#
npm
#
security
#
dependencies
#
malware
Comments
Add Comment
9 min read
From Pixels to Payload Part 2: DLL Search Order Hijacking via explorer.exe
yuribe
yuribe
yuribe
Follow
Mar 28
From Pixels to Payload Part 2: DLL Search Order Hijacking via explorer.exe
#
windows
#
dllhijacking
#
malware
#
lowlevel
Comments
Add Comment
3 min read
Malware Analysis: Discord-Delivered Infostealer (Lapresse)
yuribe
yuribe
yuribe
Follow
Mar 28
Malware Analysis: Discord-Delivered Infostealer (Lapresse)
#
malware
#
infostealer
#
python
#
reverseengineering
Comments
Add Comment
4 min read
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 28
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed
#
cybersecurity
#
steganography
#
supplychain
#
malware
Comments
Add Comment
7 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account