DEV Community

# malware

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Driving Ghidra Static Analysis with Local LLMs (LM Studio + GhidraMCP Setup)

Driving Ghidra Static Analysis with Local LLMs (LM Studio + GhidraMCP Setup)

Comments
3 min read
The Looming Threat of AI-Powered Malware: Could Machines Out-Hack Us?

The Looming Threat of AI-Powered Malware: Could Machines Out-Hack Us?

Comments
2 min read
Automating Ransomware Detection in Under 5 Minutes (Scripts, Heuristics, and Playbooks)

Automating Ransomware Detection in Under 5 Minutes (Scripts, Heuristics, and Playbooks)

1
Comments
4 min read
SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

SHENRON (Part 2): Anatomy of a Shape Shifter Inside the Framework

1
Comments
4 min read
How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

How a Mandatory Accounting Software Became the Gateway to Ukraine’s NotPetya Cyberattack

1
Comments
2 min read
𝗦𝘁𝗼𝗽 𝗖𝘆𝗯𝗲𝗿𝗮𝘁𝘁𝗮𝗰𝗸𝘀 𝗙𝗮𝘀𝘁

𝗦𝘁𝗼𝗽 𝗖𝘆𝗯𝗲𝗿𝗮𝘁𝘁𝗮𝗰𝗸𝘀 𝗙𝗮𝘀𝘁

1
Comments
1 min read
A simple port scanner

A simple port scanner

Comments
2 min read
How to Remove Malware from WordPress & Secure Your Site

How to Remove Malware from WordPress & Secure Your Site

Comments
9 min read
Quantum Root

Quantum Root

1
Comments
2 min read
ইতিহাসের সবচেয়ে বড় পাসওয়ার্ড লিক (১৬ বিলিয়ন একাউন্ট হ্যাক)

ইতিহাসের সবচেয়ে বড় পাসওয়ার্ড লিক (১৬ বিলিয়ন একাউন্ট হ্যাক)

Comments
1 min read
Malware vs. Spyware: What’s the Difference and How to Stay Safe

Malware vs. Spyware: What’s the Difference and How to Stay Safe

Comments
3 min read
Cybersecurity worm WannaCry

Cybersecurity worm WannaCry

Comments
1 min read
Protect Yourself from Ransomware: Tips, Types, and Recovery Steps

Protect Yourself from Ransomware: Tips, Types, and Recovery Steps

Comments
7 min read
Understanding Trojans: What They Are and How to Protect Yourself

Understanding Trojans: What They Are and How to Protect Yourself

1
Comments
6 min read
The Trojan Horse Job Offer - How a Hacked LinkedIn Profile & Stolen Project Delivered Malware

The Trojan Horse Job Offer - How a Hacked LinkedIn Profile & Stolen Project Delivered Malware

4
Comments 2
7 min read
Understanding Worms in Cybersecurity

Understanding Worms in Cybersecurity

1
Comments
9 min read
WARNING: Malicious Repository Attack Targeting Cryptocurrency Developers on Upwork

WARNING: Malicious Repository Attack Targeting Cryptocurrency Developers on Upwork

Comments
3 min read
Windows Security Alert: Signs of a Hack & How to Remove Malware

Windows Security Alert: Signs of a Hack & How to Remove Malware

Comments
5 min read
Cloud-Native Threat Detection: Deploying YARA for Scalable Malware Detection in EKS

Cloud-Native Threat Detection: Deploying YARA for Scalable Malware Detection in EKS

Comments
4 min read
Coyote Malware Exploits LNK Files for Undetectable Attacks on Windows

Coyote Malware Exploits LNK Files for Undetectable Attacks on Windows

Comments
3 min read
Malware Analysis: CryptoLocker

Malware Analysis: CryptoLocker

Comments
3 min read
🚨 Attention Docker Users on Mac 🚨

🚨 Attention Docker Users on Mac 🚨

69
Comments 13
1 min read
Fixing docker's malware warning on macOS Sequoia

Fixing docker's malware warning on macOS Sequoia

26
Comments 3
2 min read
🚨 Attention Docker Users on Mac 🚨

🚨 Attention Docker Users on Mac 🚨

1
Comments
1 min read
Security Update on Google Chrome Extensions

Security Update on Google Chrome Extensions

1
Comments
2 min read
loading...