DEV Community

# malware

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
From Pixels to Payload Part 2: DLL Search Order Hijacking via explorer.exe

From Pixels to Payload Part 2: DLL Search Order Hijacking via explorer.exe

Comments
3 min read
Malware Analysis: Discord-Delivered Infostealer (Lapresse)

Malware Analysis: Discord-Delivered Infostealer (Lapresse)

Comments
4 min read
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed

Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed

Comments
7 min read
Who is Dao Minh Nghia? A 17-Year-Old's Journey from Malware Creator to Cybersecurity Defender

Who is Dao Minh Nghia? A 17-Year-Old's Journey from Malware Creator to Cybersecurity Defender

1
Comments
2 min read
Supply Chain Attacks on Developers: Lessons from LiteLLM and Trivy

Supply Chain Attacks on Developers: Lessons from LiteLLM and Trivy

Comments
5 min read
PyPI Compromised: Malicious Code in `telnyx` Packages Leads to Credential Theft and Malware Installation

PyPI Compromised: Malicious Code in `telnyx` Packages Leads to Credential Theft and Malware Installation

Comments
15 min read
CanisterWorm Malware Wipes Data on Iranian Machines via Compromised npm Packages and ICP Canisters

CanisterWorm Malware Wipes Data on Iranian Machines via Compromised npm Packages and ICP Canisters

1
Comments 1
7 min read
Malicious litellm Python Package Versions 1.82.7 and 1.82.8 Removed from PyPI to Prevent Credential Theft

Malicious litellm Python Package Versions 1.82.7 and 1.82.8 Removed from PyPI to Prevent Credential Theft

Comments
6 min read
Litellm 1.82.7/8 Compromised: Credential-Stealing Malware Detected, Seek Alternative Solutions

Litellm 1.82.7/8 Compromised: Credential-Stealing Malware Detected, Seek Alternative Solutions

Comments
7 min read
Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor in AI Workflows

Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor in AI Workflows

Comments
3 min read
Compromised Litellm PyPI Packages (v1.82.7, v1.82.8) Expose Users to Security Risks: Mitigation Steps Available

Compromised Litellm PyPI Packages (v1.82.7, v1.82.8) Expose Users to Security Risks: Mitigation Steps Available

Comments
12 min read
Trivy Project Compromised by Malicious Supply Chain Attack: Enhanced CI/CD Security Measures Proposed

Trivy Project Compromised by Malicious Supply Chain Attack: Enhanced CI/CD Security Measures Proposed

Comments
12 min read
🚨 Malware Found in AI Agent Skills: A Security Advisory

🚨 Malware Found in AI Agent Skills: A Security Advisory

Comments
2 min read
WP Malware Sentinel: Signature-Based Scanning That Scales With the Threat Landscape

WP Malware Sentinel: Signature-Based Scanning That Scales With the Threat Landscape

1
Comments
4 min read
Operation Epic Fury: the Iranian C2 nobody found (0/94 VT, RDTSC sandbox evasion, 8 months pre-op)

Operation Epic Fury: the Iranian C2 nobody found (0/94 VT, RDTSC sandbox evasion, 8 months pre-op)

Comments
2 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.