Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
malware
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
From Pixels to Payload Part 2: DLL Search Order Hijacking via explorer.exe
yuribe
yuribe
yuribe
Follow
Mar 28
From Pixels to Payload Part 2: DLL Search Order Hijacking via explorer.exe
#
windows
#
dllhijacking
#
malware
#
lowlevel
Comments
Add Comment
3 min read
Malware Analysis: Discord-Delivered Infostealer (Lapresse)
yuribe
yuribe
yuribe
Follow
Mar 28
Malware Analysis: Discord-Delivered Infostealer (Lapresse)
#
malware
#
infostealer
#
python
#
reverseengineering
Comments
Add Comment
4 min read
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 28
Telnyx Python SDK Compromised on PyPI: Malware Delivered via Steganography in WAV Files, Mitigation Strategies Discussed
#
cybersecurity
#
steganography
#
supplychain
#
malware
Comments
Add Comment
7 min read
Who is Dao Minh Nghia? A 17-Year-Old's Journey from Malware Creator to Cybersecurity Defender
a nghiaoak
a nghiaoak
a nghiaoak
Follow
Mar 28
Who is Dao Minh Nghia? A 17-Year-Old's Journey from Malware Creator to Cybersecurity Defender
#
cybersecurity
#
malware
#
blueteam
#
vietnam
1
 reaction
Comments
Add Comment
2 min read
Supply Chain Attacks on Developers: Lessons from LiteLLM and Trivy
Pooya Golchian
Pooya Golchian
Pooya Golchian
Follow
Mar 27
Supply Chain Attacks on Developers: Lessons from LiteLLM and Trivy
#
security
#
supplychain
#
malware
#
developertools
Comments
Add Comment
5 min read
PyPI Compromised: Malicious Code in `telnyx` Packages Leads to Credential Theft and Malware Installation
Artyom Kornilov
Artyom Kornilov
Artyom Kornilov
Follow
Mar 27
PyPI Compromised: Malicious Code in `telnyx` Packages Leads to Credential Theft and Malware Installation
#
security
#
pypi
#
malware
#
steganography
Comments
Add Comment
15 min read
CanisterWorm Malware Wipes Data on Iranian Machines via Compromised npm Packages and ICP Canisters
Olga Larionova
Olga Larionova
Olga Larionova
Follow
Mar 27
CanisterWorm Malware Wipes Data on Iranian Machines via Compromised npm Packages and ICP Canisters
#
malware
#
cybersecurity
#
npm
#
c2
1
 reaction
Comments
1
 comment
7 min read
Malicious litellm Python Package Versions 1.82.7 and 1.82.8 Removed from PyPI to Prevent Credential Theft
Roman Dubrovin
Roman Dubrovin
Roman Dubrovin
Follow
Mar 26
Malicious litellm Python Package Versions 1.82.7 and 1.82.8 Removed from PyPI to Prevent Credential Theft
#
security
#
malware
#
pypi
#
dependencies
Comments
Add Comment
6 min read
Litellm 1.82.7/8 Compromised: Credential-Stealing Malware Detected, Seek Alternative Solutions
Roman Dubrovin
Roman Dubrovin
Roman Dubrovin
Follow
Mar 25
Litellm 1.82.7/8 Compromised: Credential-Stealing Malware Detected, Seek Alternative Solutions
#
security
#
malware
#
ai
#
alternatives
Comments
Add Comment
7 min read
Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor in AI Workflows
Arkaprabha Banerjee
Arkaprabha Banerjee
Arkaprabha Banerjee
Follow
Mar 25
Malicious litellm 1.82.8: Credential Theft and Persistent Backdoor in AI Workflows
#
artificialintelligen
#
cybersecurity
#
malware
#
mlops
Comments
Add Comment
3 min read
Compromised Litellm PyPI Packages (v1.82.7, v1.82.8) Expose Users to Security Risks: Mitigation Steps Available
Artyom Kornilov
Artyom Kornilov
Artyom Kornilov
Follow
Mar 24
Compromised Litellm PyPI Packages (v1.82.7, v1.82.8) Expose Users to Security Risks: Mitigation Steps Available
#
security
#
pypi
#
malware
#
compromise
Comments
Add Comment
12 min read
Trivy Project Compromised by Malicious Supply Chain Attack: Enhanced CI/CD Security Measures Proposed
Marina Kovalchuk
Marina Kovalchuk
Marina Kovalchuk
Follow
Mar 25
Trivy Project Compromised by Malicious Supply Chain Attack: Enhanced CI/CD Security Measures Proposed
#
cybersecurity
#
supplychain
#
cicd
#
malware
Comments
Add Comment
12 min read
🚨 Malware Found in AI Agent Skills: A Security Advisory
airano
airano
airano
Follow
Mar 20
🚨 Malware Found in AI Agent Skills: A Security Advisory
#
ai
#
security
#
malware
#
opensource
Comments
Add Comment
2 min read
WP Malware Sentinel: Signature-Based Scanning That Scales With the Threat Landscape
victorstackAI
victorstackAI
victorstackAI
Follow
Mar 17
WP Malware Sentinel: Signature-Based Scanning That Scales With the Threat Landscape
#
wordpress
#
drupal
#
security
#
malware
1
 reaction
Comments
Add Comment
4 min read
Operation Epic Fury: the Iranian C2 nobody found (0/94 VT, RDTSC sandbox evasion, 8 months pre-op)
Paolo Costanzo
Paolo Costanzo
Paolo Costanzo
Follow
Mar 17
Operation Epic Fury: the Iranian C2 nobody found (0/94 VT, RDTSC sandbox evasion, 8 months pre-op)
#
security
#
threatintel
#
osint
#
malware
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account