DEV Community

# malware

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Someone Built Android Malware That Asks Google's AI How to Survive. It Worked.

Someone Built Android Malware That Asks Google's AI How to Survive. It Worked.

Comments
3 min read
Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT

Gamers Beware: Fake Roblox and Xeno Tools Are Spreading a Windows RAT

Comments
2 min read
ScarCruft Ruby Jumper: How North Korean Hackers Breach Air-Gapped Networks via USB and Zoho WorkDrive in 2026

ScarCruft Ruby Jumper: How North Korean Hackers Breach Air-Gapped Networks via USB and Zoho WorkDrive in 2026

Comments
4 min read
RESURGE Malware: CISA Warns It May Be Dormant on Your Ivanti Devices Right Now (CVE-2025-0282)

RESURGE Malware: CISA Warns It May Be Dormant on Your Ivanti Devices Right Now (CVE-2025-0282)

1
Comments
4 min read
Aeternum C2: The Botnet That Lives on the Polygon Blockchain

Aeternum C2: The Botnet That Lives on the Polygon Blockchain

Comments
3 min read
Dohdoor Malware: New Backdoor Targets U.S. Education & Healthcare (UAT-10027)

Dohdoor Malware: New Backdoor Targets U.S. Education & Healthcare (UAT-10027)

Comments
4 min read
Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets

Divide and conquer: how the new Keenadu backdoor exposed links between major Android botnets

Comments
1 min read
SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook

SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook

1
Comments
1 min read
Malicious Go Module Impersonates crypto Library to Deploy Rekoobe Backdoor

Malicious Go Module Impersonates crypto Library to Deploy Rekoobe Backdoor

1
Comments
3 min read
Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Safeguarding Your Stack: Unmasking a Coordinated Malware Campaign Disguised as a Software Engineering Tool

Comments
5 min read
DynoWiper update: Technical analysis and attribution

DynoWiper update: Technical analysis and attribution

Comments
1 min read
2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

2026-01-20: VIP Recovery infection with FTP data exfiltration traffic

Comments
1 min read
Dissecting Digital Viruses: My First Steps in Malware Analysis

Dissecting Digital Viruses: My First Steps in Malware Analysis

Comments
2 min read
Lab 01: Where It All Begins — Static Analysis of 4 Malware Samples

Lab 01: Where It All Begins — Static Analysis of 4 Malware Samples

Comments
9 min read
How Hackers Hide Malware Inside Android Apps

How Hackers Hide Malware Inside Android Apps

3
Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.