#malwaredetection
Static Malware Analysis Checklist 🐞🔍
Static malware analysis involves examining malicious code without executing it.
#MalwareAnalysis #StaticAnalysis #CyberSecurity #ThreatHunting #InfoSec #ReverseEngineering #SecurityTools #MalwareDetection #CyberAwareness #SOCskills
October 27, 2025 at 11:00 PM
Types of Malware Analysis 🧬🛡️
Malware analysis helps understand how malicious software works and how to defend against it.
#MalwareAnalysis #CyberSecurity #InfoSec #ThreatDetection #StaticAnalysis #DynamicAnalysis #TechExplained #MalwareDetection
August 30, 2025 at 11:00 PM
Microsoft unveils Project Ire, an AI agent that autonomously detects and classifies malware, revolutionizing cybersecurity. #Microsoft #ProjectIre #Cybersecurity #AI #MalwareDetection Link: thedailytechfeed.com/microsofts-p...
August 6, 2025 at 4:44 PM
Microsoft unveils Project Ire, an AI agent that autonomously detects and blocks malware, enhancing cybersecurity with high accuracy and minimal human input. #Microsoft #AI #Cybersecurity #MalwareDetection Link: thedailytechfeed.com/microsofts-p...
August 6, 2025 at 4:12 PM
Oh, die haben das Pentesting und alles mit menschlicher Arbeit rausgezogen und mit Mandiant an Google verkauft. Danach haben die nur noch YARA-ähnliches Malwaredetection Zeug unter dem Firmennamen Trellix gemacht. Früher waren die ein Unternehmen von dem die Namen für APT/Malware kam.
August 4, 2025 at 12:37 PM
LLM-Based Identification of Infostealer Infection Vectors from
Screenshots: The Case of Aurora
Eric Clay, Estelle Ruellan et al.
Paper
Details
#AuroraInfostealer #LLMCybersecurity #MalwareDetection
August 2, 2025 at 4:04 PM
The Malware Mirage — Why are advanced tools missing real threats? Adaptive malware is exploiting behavioral blind spots, causing dangerous false negatives. Learn how to fight back.
#Cybersecurity #MalwareDetection #ThreatIntel #AI #FalseNegatives #CyberLens

cyberlens.beehiiv.com/p/the-malwar...
The Malware Mirage: Unmasking False Negatives in Adaptive Threat Detection
Why Even Advanced Detection Engines Miss Adaptive Malware—and How to Fight Back
cyberlens.beehiiv.com
July 8, 2025 at 12:19 AM
🛑 Stop malware before it spreads! Huntress breaks down how to detect and eliminate persistent threats before they wreak havoc on your systems. #Cybersecurity #MalwareDetection 44

🔎 Learn how:
Detect and Eliminate Persistent Malware Before It Wreaks Havoc | Huntress
Stopping malware isn’t about catching one-off alerts. It’s about finding and shutting down the persistence that keeps them in your systems. Here’s how Huntress found, fought, and drop-kicked malware that others missed.
f.mtr.cool
April 14, 2025 at 1:02 PM
Think your devices are safe? 🤔 Think again! Our latest guide shows you how to spot hidden malware that might be secretly stealing your data. 🛡️ Get the tools to detect and eliminate these threats now! 🚀 #DigitalSecurity #MalwareDetection #CyberProtection #NovoIT

novoit.uk/cybersecurit...
March 31, 2025 at 12:47 PM
Ransomware Found in VSCode Extensions Raises Concerns Over Microsoft’s Security Review #CyberSecurity #Extension #MalwareDetection
Ransomware Found in VSCode Extensions Raises Concerns Over Microsoft’s Security Review
 Cybersecurity experts have discovered ransomware hidden within two Visual Studio Code (VSCode) Marketplace extensions, raising concerns about Microsoft’s ability to detect malicious software in its platform. The compromised extensions, named “ahban.shiba” and “ahban.cychelloworld,” were downloaded by users before security researchers flagged them and they were subsequently removed.  Despite Microsoft’s security measures, the extensions remained publicly accessible for a significant period, highlighting potential gaps in the company’s review process. The “ahban.cychelloworld” extension was first uploaded on October 27, 2024, followed by “ahban.shiba” on February 17, 2025. The VSCode Marketplace, designed to provide developers with additional tools for Microsoft’s popular coding platform, has come under scrutiny for failing to identify these threats.  Researchers at ReversingLabs determined that both extensions included a PowerShell script that connected to a remote Amazon Web Services (AWS) server to download further malicious code. This secondary payload functioned as ransomware, though evidence suggests it was still in a testing phase.  Unlike traditional ransomware that encrypts entire systems, this malware specifically targeted files stored in C:\users%username%\Desktop\testShiba.  Once the encryption was complete, victims received a Windows notification stating: “Your files have been encrypted. Pay 1 ShibaCoin to ShibaWallet to recover them.” However, no further instructions or payment details were provided, suggesting the malware was not yet fully developed.   Although Microsoft eventually removed the extensions, security researcher Italy Kruk from ExtensionTotal disclosed that their automated detection system had identified the malicious code much earlier. Kruk stated that they had alerted Microsoft about the issue but received no response. Further analysis revealed that the initial version of “ahban.cychelloworld” was clean, but the ransomware was introduced in version 0.0.2, which was released on November 24, 2024. ExtensionTotal flagged this version to Microsoft on November 25, yet the extension remained available for months.  During this time, five more versions were uploaded, all containing the same ransomware. This case has intensified concerns about Microsoft’s ability to monitor third-party extensions effectively. The security lapse within the VSCode Marketplace highlights the risk developers face when downloading extensions, even from official sources. Microsoft has previously faced criticism for both slow responses to security threats and for mistakenly removing non-malicious extensions.  A notable example involved two popular VSCode themes, ‘Material Theme – Free’ and ‘Material Theme Icons – Free,’ which were taken down due to suspected obfuscated JavaScript. However, after further review, Microsoft determined the extensions were safe, reinstated them, and apologized, promising improvements to its security screening process. The presence of ransomware in widely used developer tools underscores the need for stronger security measures. Developers must stay cautious, regularly update security protocols, and carefully evaluate third-party extensions before installing them, even when they come from official platforms like the VSCode Marketplace.
dlvr.it
March 29, 2025 at 3:57 PM
🏁 New Challenge! The ELSA #Cybersecurity Use Case team announces the "Robust Android Malware Detection Competition" at IEEE SaTML Apr 9-11, 2025 in Copenhagen 🇩🇰!

Register by March 31! 👉 bit.ly/4hxncR4
#MalwareDetection #SaTML2025
Robust Android Malware Detection Competition – IEEE SaTML 2025 – ELSA
bit.ly
March 21, 2025 at 2:01 PM
Mal-Where? How We Boosted Malware Detection to XG-ceptional Levels #Technology #Cybersecurity hashtag1: #MalwareDetection hashtag2: hashtag3: #TechInnovation
Mal-Where? How We Boosted Malware Detection to XG-ceptional Levels
:::info Authors: (1) S M Rakib Hasan, Department of Computer Science and Engineering, BRAC University, Dhaka, Bangladesh (sm.rakib.hasan@g.bracu.ac.bd); (2) Aakar Dhakal, Department of Computer Science...
puretech.news
March 17, 2025 at 7:45 PM
The paper focuses on machine learning methods being applied to detect obfuscated malware in memory dumps with class imbalance addressed. #malwaredetection
Hide and Seek in Memory: Outsmarting Sneaky Malware with Data Magic
hackernoon.com
February 18, 2025 at 9:28 AM
ARC Labs breaks down Rhadamanthys Stealer, revealing its infection process and advanced evasion tactics. Learn how to detect key indicators like command-line arguments, process injections, and C2 communications here: www.binarydefense.com/resources/bl...
#MalwareDetection #ThreatDefense
Rhadamanthys Stealer Analysis for Detection Opportunities  | Binary Defense
ARC Labs analyzed the Rhadamanthys Stealer infection chain to provide actionable detection insights. Learn about phishing tactics, process injection, and specific queries to strengthen your defenses
www.binarydefense.com
December 20, 2024 at 4:00 PM