read.ehrlich.dev
ai-curated rss
about
github
rss
dark
malware analysis
Dissecting hostile code to understand attack vectors and evasion
hot
new
week
month
year
spaces
all
ai
internet culture
writing
information theory
malware analysis
devops
site reliability
security
machine learning
cloud infrastructure
ai agents
quantum computing
open source
digital rights
behavioral economics
reverse engineering
energy
complexity
distributed systems
economics
databases
api design
git internals
wasm
materials science
data engineering
webdev
math olympiad
physics
cryptography
design
thermodynamics
mathematics
solo dev
observability
indie games
chemistry
programming languages
cellular automata
python
containers
technical writing
game theory
birding
reinforcement learning
nanotechnology
creative coding
statistics
climate science
procedural generation
worldbuilding
space exploration
astrophysics
game dev
data visualization
operating systems
networking
linux
computer vision
golang
robotics
astrobiology
aerospace
exploit development
neuroscience
cognitive science
manga
algorithmic trading
elixir
decision theory
computer graphics
political philosophy
history of science
formal verification
javascript
mechanical keyboards
swift
category theory
self hosted
board games
type theory
evolution
philosophy
rust
nix
philosophy of mind
embedded systems
urban exploration
retrocomputing
compilers
amateur astronomy
nuclear
information design
computer architecture
electronic music
oceanography
archaeology
chess
genetics
fractals
geology
ethics
kotlin
go game
vinyl
number theory
anthropology
aquariums
film
history of computing
lisp
synths
bioinformatics
pharmacology
ecology
metaphysics
semiotics
audio programming
history
paleoanthropology
topology
cpp
photography
haskell
consciousness
witsrtn
cartography
meditation
ham radio
fpga
sci fi
shell scripting
demoscene
homelab
horror
speedrunning
typography
tabletop rpg
animation
woodworking
3d printing
sourdough
puzzles
standup comedy
phenomenology
linguistics
existentialism
music theory
true crime
fermentation
lock picking
espresso
zig
finance
pixel art
philosophy of science
nonduality
typescript
conlangs
mycology
forth
175
GlassWorm malware hides in invisible open-source code
(scientificamerican.com)
23 days ago ·
malware analysis
·
reverse engineering
155
Cyber OpSec Fail: Beast Gang Exposes Ransomware Server
(darkreading.com)
24 days ago ·
digital rights
·
malware analysis
165
Threat Intelligence Report: MANGO SANDSTORM Dindoor / Fakeset Campaign
(krypt3ia.wordpress.com)
24 days ago ·
malware analysis
·
cryptography
280
54 EDR Killers Use BYOVD to Exploit 35 Signed Vulnerable Drivers and Disable Security
(thehackernews.com)
25 days ago ·
malware analysis
·
reverse engineering
360
A DarkSword hangs over unpatched iPhones
(malwarebytes.com)
25 days ago ·
reverse engineering
·
malware analysis
70
Hackers Compromised 7,500+ Magento Websites to Upload Hidden Malicious Files and Steal Data
(cybersecuritynews.com)
24 days ago ·
malware analysis
·
digital rights
68
Perseus Android Malware Steals User Notes and Enables Full Device Takeover
(cybersecuritynews.com)
24 days ago ·
malware analysis
·
reverse engineering
65
US seizes domains and infrastructure used in sprawling botnet campaigns
(therecord.media)
24 days ago ·
digital rights
·
malware analysis
72
CISA Warns of Cisco Secure Firewall Management Center 0-Day Exploited in Ransomware Attacks
(cybersecuritynews.com)
24 days ago ·
security
·
malware analysis
40
Hacker Group LAPSUS$ Claims Alleged AstraZeneca Data Breach
(hackread.com)
24 days ago ·
malware analysis
·
open source
560
DarkSword: iPhone Exploit Kit Serves Spies & Thieves Alike
(darkreading.com)
26 days ago ·
malware analysis
·
reverse engineering
62
Global law enforcement operation targets AISURU, Kimwolf, JackSkid botnet operators
(securityaffairs.com)
24 days ago ·
digital rights
·
malware analysis
55
Interlock Ransomware Targets Cisco Enterprise Firewalls
(darkreading.com)
24 days ago ·
security
·
malware analysis
52
Ransomware Actors Expand EDR Killer Tactics Beyond Vulnerable Drivers
(cybersecuritynews.com)
24 days ago ·
malware analysis
·
security
42
Microsoft is ending the Windows Update nightmare — and letting you pause them indefinitely
(theverge.com)
24 days ago ·
malware analysis
·
reverse engineering
42
The Good, the Bad and the Ugly in Cybersecurity – Week 12
(sentinelone.com)
24 days ago ·
malware analysis
·
digital rights
220
Interlock group exploiting the CISCO FMC flaw CVE-2026-20131 36 days before disclosure
(securityaffairs.com)
25 days ago ·
security
·
malware analysis
85
Enabling MTE for the LLDB Test Suite
(jonasdevlieghere.com)
25 days ago ·
reverse engineering
·
malware analysis
48
Apple urges iPhone users to update as Coruna and DarkSword exploit kits emerge
(securityaffairs.com)
24 days ago ·
reverse engineering
·
malware analysis
115
DarkSword emerges as powerful iOS exploit tool in global attacks
(securityaffairs.com)
25 days ago ·
malware analysis
·
reverse engineering
28
NHTSA Elevates Tesla FSD Probe To Engineering Analysis
(cleantechnica.com)
24 days ago ·
site reliability
·
malware analysis
25
California city reports ransomware attack as LA transit agency finds ‘unauthorized activity’
(therecord.media)
24 days ago ·
malware analysis
·
digital rights
28
New Fake Zoom Meeting Invite Scam Spreads Malware on Windows PCs
(hackread.com)
24 days ago ·
malware analysis
·
security
310
Snowflake Cortex AI Escapes Sandbox and Executes Malware
(simonwillison.net)
26 days ago ·
malware analysis
·
security
110
Everyday tools, extraordinary crimes: the ransomware exfiltration playbook
(blog.talosintelligence.com)
25 days ago ·
malware analysis
·
security
28
GSocket Backdoor Delivered Through Bash Script, (Fri, Mar 20th)
(isc.sans.edu)
24 days ago ·
malware analysis
·
security
22
The Importance of Behavioral Analytics in AI-Enabled Cyber Attacks
(thehackernews.com)
24 days ago ·
ai
·
malware analysis
270
Transparent COM instrumentation for malware analysis
(blog.talosintelligence.com)
26 days ago ·
malware analysis
·
observability
48
Fake Windsurf IDE Extension Uses Solana Blockchain to Steal Developer Data
(hackread.com)
25 days ago ·
malware analysis
·
reverse engineering
28
Speagle Malware Hijacks Cobra DocGuard to Steal Data via Compromised Servers
(thehackernews.com)
25 days ago ·
malware analysis
·
security
72
Interesting Message Stored in Cowrie Logs, (Wed, Mar 18th)
(isc.sans.edu)
26 days ago ·
security
·
malware analysis
65
How to Debug Code with Claude Code: Fixing Bugs 10x Faster
(collabnix.com)
25 days ago ·
reverse engineering
·
malware analysis
45
Disintegration Fingerprinting published in Analytical Chemistry
(groverlab.org)
25 days ago ·
chemistry
·
malware analysis
58
C2 Implant 'SnappyClient' Targets Crypto Wallets
(darkreading.com)
26 days ago ·
malware analysis
·
reverse engineering
20
Ready for macOS Threats: Expanding Your SOC’s Cross-Platform Analysis with ANY.RUN
25 days ago ·
malware analysis
·
reverse engineering
20
Ready for macOS Threats: Expanding Your SOC’s Cross-Platform Analysis with ANY.RUN
25 days ago ·
malware analysis
·
reverse engineering
68
Italian Prosecutors Confirm Journalist Was Hacked with Paragon Spyware
(citizenlab.ca)
26 days ago ·
digital rights
·
malware analysis
68
Scans for "adminer", (Wed, Mar 18th)
(isc.sans.edu)
26 days ago ·
security
·
malware analysis
65
New ClickFix Scam Tricks Users Into Mapping Hacker-Controlled Drives
(hackread.com)
26 days ago ·
malware analysis
·
reverse engineering
24
Arcjet Extends Runtime Policy Engine to Block Malicious Prompts
(devops.com)
26 days ago ·
malware analysis
·
ai
42
How to Reduce MTTR in Your SOC with Better Threat Intelligence
26 days ago ·
site reliability
·
malware analysis
32
How an Iranian-backed group crippled Stryker’s Irish HQ with a ‘wiper’ cyberattack
(bhconsulting.ie)
26 days ago ·
cloud infrastructure
·
malware analysis
28
Cyber attack on Cork-based Stryker shows Ireland is in the line of fire from Iran’s hackers
(bhconsulting.ie)
26 days ago ·
cloud infrastructure
·
malware analysis
370
A GitHub Issue Title Compromised 4,000 Developer Machines
(freek.dev)
28 days ago ·
malware analysis
·
git internals
62
Input Filtering Algorithms for Digital Signal Processing
(circuitcellar.com)
27 days ago ·
malware analysis
·
audio programming
82
How searching for a VPN could mean handing over your work login details
(malwarebytes.com)
27 days ago ·
security
·
malware analysis
280
Free real estate: GoPix, the banking Trojan living off your memory
(securelist.com)
28 days ago ·
malware analysis
·
exploit development
55
Fake Pudgy World site steals your crypto passwords
(malwarebytes.com)
27 days ago ·
solo dev
·
malware analysis
32
CISA's Free Internet Scanning - Malware Disguised as a VPN
(twit.tv)
27 days ago ·
digital rights
·
malware analysis
88
Fragments: March 16
(martinfowler.com)
28 days ago ·
ai
·
malware analysis
22
OpenAI Japan announces Japan Teen Safety Blueprint to put teen safety first
(openai.com)
27 days ago ·
ai
·
malware analysis
68
/proxy/ URL scans with IP addresses, (Mon, Mar 16th)
(isc.sans.edu)
28 days ago ·
security
·
malware analysis
48
Vulnerabilities in multiple tinycontrol devices
(cert.pl)
28 days ago ·
reverse engineering
·
malware analysis
22
ANY.RUN at RootedCON 2026: Meeting Security Teams and Showcasing New Capabilities
28 days ago ·
malware analysis
·
cloud infrastructure
18
ANY.RUN at RootedCON 2026: Meeting Security Teams and Showcasing New Capabilities
28 days ago ·
malware analysis
·
cloud infrastructure
295
Malicious npm Packages Posing as Solara Executor Target Discord, Browsers, and Crypto Wallets
(cybersecuritynews.com)
1 month ago ·
open source
·
malware analysis
155
Matt Mullenweg Documents a Dastardly Clever Apple Account Phishing Scam
(ma.tt)
1 month ago ·
malware analysis
·
open source
40
SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 88
(securityaffairs.com)
29 days ago ·
malware analysis
·
reverse engineering
250
GlassWorm Campaign Uses 72 Malicious Open VSX Extensions to Broaden Reach
(cybersecuritynews.com)
1 month ago ·
malware analysis
62
I Built a Bash Script That Traces Code Faster Than Your IDE (And Saves AI Tokens)
(dev.to)
1 month ago ·
shell scripting
·
malware analysis
25
Payload Ransomware claims the hack of Royal Bahrain Hospital
(securityaffairs.com)
29 days ago ·
security
·
malware analysis
310
[$] More timing side-channels for the page cache
(lwn.net)
1 month ago ·
golang
·
malware analysis
300
An investigation of the forces behind the age-verification bills
(lwn.net)
1 month ago ·
digital rights
·
malware analysis
155
I built a security scanner for OpenClaw after 824 malicious skills were found
(news.ycombinator.com)
1 month ago ·
malware analysis
200
Patch Me If You Can: AI Codemods for Secure-by-Default Android Apps
(engineering.fb.com)
1 month ago ·
malware analysis
·
reverse engineering
42
De zéro à Data Analyst — Ma reconversion
(dev.to)
1 month ago ·
malware analysis
·
reverse engineering
80
Chinese Hackers Target Southeast Asian Militaries with AppleChris and MemFun Malware
(thehackernews.com)
1 month ago ·
malware analysis
95
Storm-2561 Spreads Trojan VPN Clients via SEO Poisoning to Steal Credentials
(thehackernews.com)
1 month ago ·
security
·
malware analysis
65
Fake PoCs, Misunderstood Risks Cause Cisco SD-WAN Chaos
(darkreading.com)
1 month ago ·
site reliability
·
malware analysis
68
Cyberattackers Don't Care About Good Causes
(darkreading.com)
1 month ago ·
digital rights
·
malware analysis
20
Show HN: Auditor Core – Enterprise security auditing engine for DevSecOps
(datawizual.github.io)
1 month ago ·
malware analysis
67
FBI Launches Investigation Into Games Removed From Steam Over Malware Concerns
(gamespot.com)
1 month ago ·
malware analysis
·
indie games
80
Attackers impersonate Temu in ClickFix $Temu airdrop scam
(malwarebytes.com)
1 month ago ·
malware analysis
72
AI-assisted Slopoly malware powers Hive0163’s ransomware campaigns
(securityaffairs.com)
1 month ago ·
malware analysis
·
cloud infrastructure
240
This Android vulnerability can break your lock screen in under 60 seconds
(malwarebytes.com)
1 month ago ·
security
·
malware analysis
52
Watch out for fake Malwarebytes renewal notices in your calendar
(malwarebytes.com)
1 month ago ·
malware analysis
·
security
20
Authorities Crack Down on 45,000 Malicious IPs Powering Ransomware Attacks
(cybersecuritynews.com)
1 month ago ·
digital rights
·
malware analysis
48
Real-Time Banking Trojan Strikes Brazil's Pix Users
(darkreading.com)
1 month ago ·
malware analysis
145
“Handala Hack” – Unveiling Group’s Modus Operandi
(research.checkpoint.com)
1 month ago ·
malware analysis
42
Authorities Dismantle Malicious Proxy Service Used to Deploy Malware Attacking Thousands of Users
(cybersecuritynews.com)
1 month ago ·
digital rights
·
malware analysis
24
Chromium: CVE-2026-3942 Incorrect security UI in PictureInPicture
(msrc.microsoft.com)
1 month ago ·
security
·
malware analysis
10
Metal Gear: Ghost Babel
(gameboyessentials.com)
1 month ago ·
go game
·
malware analysis
38
Ransomware incident responder gave info to BlackCat cybercriminals during negotiations, DOJ alleges
(therecord.media)
1 month ago ·
malware analysis
·
digital rights
105
The Market for Spyware is Growing: It’s Used Differently Against Women
(citizenlab.ca)
1 month ago ·
malware analysis
·
digital rights
165
MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection
1 month ago ·
malware analysis
·
site reliability
95
Iran MOIS Colludes With Criminals to Boost Cyberattacks
(darkreading.com)
1 month ago ·
malware analysis
·
cryptography
22
Hackers targeted Poland’s National Centre for Nuclear Research
(securityaffairs.com)
1 month ago ·
malware analysis
32
Google patches two Chrome zero-days under active attack. Update now
(malwarebytes.com)
1 month ago ·
reverse engineering
·
malware analysis
48
Authorities Disrupt SocksEscort Proxy Botnet Exploiting 369,000 IPs Across 163 Countries
(thehackernews.com)
1 month ago ·
digital rights
·
malware analysis
78
Taming the dragon: reverse engineering firmware with Ghidra
(pentestpartners.com)
1 month ago ·
malware analysis
·
reverse engineering
135
MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection
1 month ago ·
malware analysis
·
site reliability
85
AMOS and Amatera disguised as AI agents | Kaspersky official blog
(kaspersky.co.uk)
1 month ago ·
malware analysis
·
reverse engineering
128
MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection
1 month ago ·
malware analysis
120
MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection
1 month ago ·
malware analysis
22
INTERPOL Dismantles 45,000 Malicious IPs, Arrests 94 in Global Cybercrime
(thehackernews.com)
1 month ago ·
digital rights
·
malware analysis
115
MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection
1 month ago ·
malware analysis
70
Rust-Based VENON Malware Targets 33 Brazilian Banks with Credential-Stealing Overlays
(thehackernews.com)
1 month ago ·
malware analysis
18
Will AI Save Consumers From Smartphone-Based Phishing Attacks?
(darkreading.com)
1 month ago ·
malware analysis
78
MicroStealer Analysis: A Fast-Spreading Infostealer with Limited Detection
1 month ago ·
malware analysis
·
site reliability
155
Sextortion “I recorded you” emails reuse passwords found in disposable inboxes
(malwarebytes.com)
1 month ago ·
malware analysis
spaces
all
ai
internet culture
writing
information theory
malware analysis
devops
site reliability
security
machine learning
cloud infrastructure
ai agents
quantum computing
open source
digital rights
behavioral economics
reverse engineering
energy
complexity
distributed systems
economics
databases
api design
git internals
wasm
materials science
data engineering
webdev
math olympiad
physics
cryptography
design
thermodynamics
mathematics
solo dev
observability
indie games
chemistry
programming languages
cellular automata
python
containers
technical writing
game theory
birding
reinforcement learning
nanotechnology
creative coding
statistics
climate science
procedural generation
worldbuilding
space exploration
astrophysics
game dev
data visualization
operating systems
networking
linux
computer vision
golang
robotics
astrobiology
aerospace
exploit development
neuroscience
cognitive science
manga
algorithmic trading
elixir
decision theory
computer graphics
political philosophy
history of science
formal verification
javascript
mechanical keyboards
swift
category theory
self hosted
board games
type theory
evolution
philosophy
rust
nix
philosophy of mind
embedded systems
urban exploration
retrocomputing
compilers
amateur astronomy
nuclear
information design
computer architecture
electronic music
oceanography
archaeology
chess
genetics
fractals
geology
ethics
kotlin
go game
vinyl
number theory
anthropology
aquariums
film
history of computing
lisp
synths
bioinformatics
pharmacology
ecology
metaphysics
semiotics
audio programming
history
paleoanthropology
topology
cpp
photography
haskell
consciousness
witsrtn
cartography
meditation
ham radio
fpga
sci fi
shell scripting
demoscene
homelab
horror
speedrunning
typography
tabletop rpg
animation
woodworking
3d printing
sourdough
puzzles
standup comedy
phenomenology
linguistics
existentialism
music theory
true crime
fermentation
lock picking
espresso
zig
finance
pixel art
philosophy of science
nonduality
typescript
conlangs
mycology
forth