Home New Trending Search
About Privacy Terms
#
#MalwareDetection
Posts tagged #MalwareDetection on Bluesky
Preview
Malware Detection: 8-Step Complete Website Scanner Guide 2025 Learn how to scan your website for malware detection with professional tools and techniques. Detect, remove, and prevent malware infections to protect your site and visitor

Malware lurks in every corner of your network—… even where you least expect it. 🕷️

Unlock the complete 2025 guide to detection techniques and proactive defence👇
🌐 cyberphore.com/malware-detec...

#CyberPhore #MalwareDetection #CyberSecurity #InfoSec #DataProtection #ThreatHunting

1 0 0 0
Video thumbnail

Static Malware Analysis Checklist 🐞🔍
Static malware analysis involves examining malicious code without executing it.
#MalwareAnalysis #StaticAnalysis #CyberSecurity #ThreatHunting #InfoSec #ReverseEngineering #SecurityTools #MalwareDetection #CyberAwareness #SOCskills

0 0 0 0
Video thumbnail

Types of Malware Analysis 🧬🛡️
Malware analysis helps understand how malicious software works and how to defend against it.
#MalwareAnalysis #CyberSecurity #InfoSec #ThreatDetection #StaticAnalysis #DynamicAnalysis #TechExplained #MalwareDetection

0 0 0 0
Post image

Microsoft unveils Project Ire, an AI agent that autonomously detects and classifies malware, revolutionizing cybersecurity. #Microsoft #ProjectIre #Cybersecurity #AI #MalwareDetection Link: thedailytechfeed.com/microsofts-p...

0 1 0 0
Post image

Microsoft unveils Project Ire, an AI agent that autonomously detects and blocks malware, enhancing cybersecurity with high accuracy and minimal human input. #Microsoft #AI #Cybersecurity #MalwareDetection Link: thedailytechfeed.com/microsofts-p...

0 1 0 0

LLM-Based Identification of Infostealer Infection Vectors from
Screenshots: The Case of Aurora
Eric Clay, Estelle Ruellan et al.
Paper
Details
#AuroraInfostealer #LLMCybersecurity #MalwareDetection

1 0 0 0
Original post on universeodon.com

Just released version 1.16.8 of The Pdfalyzer with a bunch of new and updated #YARA rules to scan #PDF files for malicious content. Links in the quoted toot below.

universeodon.com/@cryptadamist/1147681706...

#ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR […]

2 1 0 0
Original post on universeodon.com

just released version 1.0.1 of The Yaralyzer. Fixes a small bug when trying to choose a byte offset to force a UTF-16 or UTF-32 decoding of matched bytes.

someone set up Yaralyzer as a #Kali package; not sure if that's made it into a release yet but if not the links are below […]

0 1 0 0
Preview
AI in Cloud Security: Top 10 Ways It's Changing the Game Discover the roles of AI in cloud security, from the limitations of traditional approaches to how AI fills the gap, in this comprehensive guide.

The Role of AI in Cloud Security bit.ly/3U0b4Pj #role #of #AI #cloud #security #hiredevelopers #hiredesigners #aicloudsecurity #benefitsofaicloudsecurity #ThreatDetection #AnomalyIdentification #AccessControls #MalwareDetection #ComplianceAuditing #Encryption #policy

0 0 1 0
Preview
The Malware Mirage: Unmasking False Negatives in Adaptive Threat Detection Why Even Advanced Detection Engines Miss Adaptive Malware—and How to Fight Back

The Malware Mirage — Why are advanced tools missing real threats? Adaptive malware is exploiting behavioral blind spots, causing dangerous false negatives. Learn how to fight back.
#Cybersecurity #MalwareDetection #ThreatIntel #AI #FalseNegatives #CyberLens

cyberlens.beehiiv.com/p/the-malwar...

0 0 0 0
Preview
Detect and Eliminate Persistent Malware Before It Wreaks Havoc | Huntress Stopping malware isn’t about catching one-off alerts. It’s about finding and shutting down the persistence that keeps them in your systems. Here’s how Huntress found, fought, and drop-kicked malware that others missed.

🛑 Stop malware before it spreads! Huntress breaks down how to detect and eliminate persistent threats before they wreak havoc on your systems. #Cybersecurity #MalwareDetection 44

🔎 Learn how:

0 0 0 0
Preview
New Tech Can Spot Hidden Malware on Your Android Phone Researchers have build a new tool to spot malware exploiting phone accessibility features and help users remove it. Accessibility features like screen readers and voice-to-text have made smartphones more...

New Tech Can Spot Hidden Malware on Your Android Phone #Science #TechnologyandEngineering #MalwareDetection #AndroidSecurity #TechInnovation

1 0 0 0
Post image

Think your devices are safe? 🤔 Think again! Our latest guide shows you how to spot hidden malware that might be secretly stealing your data. 🛡️ Get the tools to detect and eliminate these threats now! 🚀 #DigitalSecurity #MalwareDetection #CyberProtection #NovoIT

novoit.uk/cybersecurit...

0 0 0 0
Preview
Ransomware Found in VSCode Extensions Raises Concerns Over Microsoft’s Security Review  Cybersecurity experts have discovered ransomware hidden within two Visual Studio Code (VSCode) Marketplace extensions, raising concerns about Microsoft’s ability to detect malicious software in its platform. The compromised extensions, named “ahban.shiba” and “ahban.cychelloworld,” were downloaded by users before security researchers flagged them and they were subsequently removed.  Despite Microsoft’s security measures, the extensions remained publicly accessible for a significant period, highlighting potential gaps in the company’s review process. The “ahban.cychelloworld” extension was first uploaded on October 27, 2024, followed by “ahban.shiba” on February 17, 2025. The VSCode Marketplace, designed to provide developers with additional tools for Microsoft’s popular coding platform, has come under scrutiny for failing to identify these threats.  Researchers at ReversingLabs determined that both extensions included a PowerShell script that connected to a remote Amazon Web Services (AWS) server to download further malicious code. This secondary payload functioned as ransomware, though evidence suggests it was still in a testing phase.  Unlike traditional ransomware that encrypts entire systems, this malware specifically targeted files stored in C:\users%username%\Desktop\testShiba.  Once the encryption was complete, victims received a Windows notification stating: “Your files have been encrypted. Pay 1 ShibaCoin to ShibaWallet to recover them.” However, no further instructions or payment details were provided, suggesting the malware was not yet fully developed.   Although Microsoft eventually removed the extensions, security researcher Italy Kruk from ExtensionTotal disclosed that their automated detection system had identified the malicious code much earlier. Kruk stated that they had alerted Microsoft about the issue but received no response. Further analysis revealed that the initial version of “ahban.cychelloworld” was clean, but the ransomware was introduced in version 0.0.2, which was released on November 24, 2024. ExtensionTotal flagged this version to Microsoft on November 25, yet the extension remained available for months.  During this time, five more versions were uploaded, all containing the same ransomware. This case has intensified concerns about Microsoft’s ability to monitor third-party extensions effectively. The security lapse within the VSCode Marketplace highlights the risk developers face when downloading extensions, even from official sources. Microsoft has previously faced criticism for both slow responses to security threats and for mistakenly removing non-malicious extensions.  A notable example involved two popular VSCode themes, ‘Material Theme – Free’ and ‘Material Theme Icons – Free,’ which were taken down due to suspected obfuscated JavaScript. However, after further review, Microsoft determined the extensions were safe, reinstated them, and apologized, promising improvements to its security screening process. The presence of ransomware in widely used developer tools underscores the need for stronger security measures. Developers must stay cautious, regularly update security protocols, and carefully evaluate third-party extensions before installing them, even when they come from official platforms like the VSCode Marketplace.

Ransomware Found in VSCode Extensions Raises Concerns Over Microsoft’s Security Review #CyberSecurity #Extension #MalwareDetection

0 0 0 0
Preview
Understanding the Threat: How .NET MAUI is Changing Android Malware | The DefendOps Diaries Explore how .NET MAUI is revolutionizing Android malware, challenging traditional security measures with innovative evasion tactics.

Understanding the Threat: How .NET MAUI is Changing Android Malware

#dotnetmaui
#androidmalware
#cybersecurity
#mobilethreats
#malwaredetection

0 0 0 0
Preview
Microsoft Exchange Online Bug: Mistaken Quarantine of User Emails | The DefendOps Diaries Explore the recent Microsoft Exchange Online bug causing email quarantine issues and its impact on users and admins.

Microsoft Exchange Online Bug: Mistaken Quarantine of User Emails

#microsoft
#exchangeonline
#emailsecurity
#malwaredetection
#cybersecurity

0 0 0 0
Robust Android Malware Detection Competition – IEEE SaTML 2025 – ELSA

🏁 New Challenge! The ELSA #Cybersecurity Use Case team announces the "Robust Android Malware Detection Competition" at IEEE SaTML Apr 9-11, 2025 in Copenhagen 🇩🇰!

Register by March 31! 👉 bit.ly/4hxncR4
#MalwareDetection #SaTML2025

0 0 0 0
Preview
Neuvik Solving the "problem behind the cybersecurity problem" - from the server room to the Board room.

AI-based malware demands AI-driven defenses. Learn more: neuvik.com/article/using-genai-to-e...

#CyberSecurity #MalwareDetection #AIThreats #EDRBYPASS #Infosec

0 0 0 0
Preview
Mal-Where? How We Boosted Malware Detection to XG-ceptional Levels :::info Authors: (1) S M Rakib Hasan, Department of Computer Science and Engineering, BRAC University, Dhaka, Bangladesh (sm.rakib.hasan@g.bracu.ac.bd); (2) Aakar Dhakal, Department of Computer Science...

Mal-Where? How We Boosted Malware Detection to XG-ceptional Levels #Technology #Cybersecurity hashtag1: #MalwareDetection hashtag2: hashtag3: #TechInnovation

0 0 0 0
Preview
Android Phishing Apps: A Growing Cybersecurity Threat in 2024   Cybercriminals are evolving their tactics, shifting from traditional email-based phishing scams to more sophisticated Android phishing apps. According to the 2025 State of Malware report by Malwarebytes, over 22,800 phishing apps were detected on…

Android Phishing Apps: A Growing Cybersecurity Threat in 2024 #Androidphishingapps #CybersecurityThreats #MalwareDetection

1 0 0 0
Preview
Hide and Seek in Memory: Outsmarting Sneaky Malware with Data Magic

The paper focuses on machine learning methods being applied to detect obfuscated malware in memory dumps with class imbalance addressed. #malwaredetection

0 0 0 0
Preview
Government-linked Italian spyware maker caught distributing malicious Android apps Spyware maker SIO suspected of being behind 'Spyrtacus', a not-so new spywareIt was previously found on Google Play but now largely on phishing websitesA convincing paper trail links Spyrtacus back to...

Government-linked Italian spyware maker caught distributing malicious Android apps #Technology #Cybersecurity #Spyware #AndroidSecurity #MalwareDetection

0 0 0 0
Preview
Step-by-Step Guide to Detect Viruses and Unusual PC Activity Using Command Prompt (CMD) 1. Check Startup Programs

Step-by-Step Guide to Detect Viruses and Unusual PC Activity Using Command Prompt (CMD)
medium.com/freeeeeeeeee...
#CyberSecurity #PCSafety #VirusDetection #CommandPrompt #CMDCommands #TechTips #PCMaintenance #WindowsSecurity #SystemHealth #MalwareDetection #TechGuide #ComputerSecurity #Hacking

5 0 0 0
Preview
Rhadamanthys Stealer Analysis for Detection Opportunities  | Binary Defense ARC Labs analyzed the Rhadamanthys Stealer infection chain to provide actionable detection insights. Learn about phishing tactics, process injection, and specific queries to strengthen your defenses

ARC Labs breaks down Rhadamanthys Stealer, revealing its infection process and advanced evasion tactics. Learn how to detect key indicators like command-line arguments, process injections, and C2 communications here: www.binarydefense.com/resources/bl...
#MalwareDetection #ThreatDefense

0 0 1 0
Preview
GitHub - harryeetsource/yara_rules: community generated yara rules for detection of malware families community generated yara rules for detection of malware families - harryeetsource/yara_rules

Community Generated Yara Rules for detection of malware families
github.com/harryeetsour...

#cybersecurity #infosec #yararules #malwaredetection #threathunting #malware #infosec

10 2 0 0
Preview
LemonDuck Malware Detection: Exploits CVE-2017-0144 and Other Microsoft's Server Message BlockSMB Vulnerabilities for Cryptocurrency Mining - SOC Prime Detect LemonDuck malware, exploiting EternalBlue and other SMB vulnerabilities to attack Windows servers, with Sigma rules from SOC Prime Platform.

LemonDuck Malware Detection: Exploits CVE-2017-0144 and Other Microsoft’s Server Message BlockSMB Vulnerabilities for Cryptocurrency Mining
socprime.com/blog/detect-...
#Infosec #Security #Cybersecurity #CeptBiro #LemonDuck #MalwareDetection #Exploits #Microsoft #ServerMessageBlockSMB

0 0 0 0
Preview
Phishing and Malware Detection: Top Tips from K-12 Technology Leaders K-12 technology leaders share their best practices and proactive strategies for addressing phishing and malware concerns in the upcoming school year.

Phishing and Malware Detection: Top Tips from K-12 Technology Leaders
managedmethods.com/blog/phishin...
#Infosec #Security #Cybersecurity #CeptBiro #PhishingDetection #MalwareDetection

0 0 0 0