HackeraceforHackerace Blog Posthackeraceblog.hashnode.net·Oct 7, 2022Malware Threats: Detecting, preventing, and recovering from a malware attackMalware is abbreviated from the term Malicious Software. It is a collective name used to denote a variety of potentially harmful and dangerous software. Malicious software also known as Malware are specifically designed to gain unauthorized access to...Promesa and 1 other are discussing this2 people are discussing thisDiscuss·16 likes·462 readsMalwareThis is amazingly written 3
Gabi DobocanforSandwormsandworm.hashnode.net·Apr 15, 2023Dissecting Npm Malware: Five Packages And Their Evil Install ScriptsPackages published on npm can declare pre and post-install hooks, which are scripts that run, well, pre or post-install. That is to say, when the npm CLI installs a package, it also runs those scripts on your machine. It runs them silently, in the ba...Discuss·11 likes·4.1K readsnpm
Srujan LanderiforLanderi Srujansrujanlanderi.hashnode.net·Apr 20, 2023Understanding the Difference: Viruses, Malware, and RansomwareIntroduction I always thought that the terms Virus, Malware, and Ransomware were used interchangeably, until my esteemed mentor inquired about their meaning, prompting me to realize that they are different. It is important to understand their differe...Discuss·10 likescybersecurity
Srujan LanderiforLanderi Srujansrujanlanderi.hashnode.net·Apr 20, 2023Understanding the Difference: Viruses, Malware, and RansomwareIntroduction I always thought that the terms Virus, Malware, and Ransomware were used interchangeably, until my esteemed mentor inquired about their meaning, prompting me to realize that they are different. It is important to understand their differe...Discuss·10 likescybersecurity
Gabi DobocanforSandwormsandworm.hashnode.net·Apr 15, 2023Dissecting Npm Malware: Five Packages And Their Evil Install ScriptsPackages published on npm can declare pre and post-install hooks, which are scripts that run, well, pre or post-install. That is to say, when the npm CLI installs a package, it also runs those scripts on your machine. It runs them silently, in the ba...Discuss·11 likes·4.1K readsnpm
Pankaj SinghforPankaj's Blogpankaj007.hashnode.net·Mar 25, 2023Exploring the use of neural networks for malware detectionIntroduction Malware, short for malicious software, refers to any type of software intentionally designed to cause harm to a computer system, network, or mobile device. With the rise of cybercrime, detecting and preventing malware attacks has become ...Discuss·10 likesMalware
Shounak GhoshforshahankNetshahanknet.hashnode.net·Mar 20, 20230x01: I Know What You Typed Last SummerWow, I showed up with a post. Well, it is the first proper post on this blog, so naturally, there would be some kind of enthusiasm there. I figured that we should start with a bang, and then see how things go from there.One of the most dynamic area...Discuss·30 readsC++
Bablu KumarforYour Trusted Cyber Guidehacback17.hashnode.net·Mar 5, 2023CapCut Users Beware: Cybercriminals Using Malicious Software Distribution TacticsNot too long ago, a friend of mine who works in the cybersecurity field decided to make videos to educate the public on the importance of cyber awareness. To do this, he needed a reliable video editing tool that could help him create engaging content...Discuss·37 readsOSINT
NirugimaforRaidForumsraidforums.hashnode.net·Feb 28, 2023OpenAI’s ChatGPT Can Create Polymorphic MalwarePolymorphic malware typically works by altering its appearance with each iteration, making it difficult for antivirus software to recognize. CyberArk’s cybersecurity researchers have shared details on how the ChatGPT AI chatbot can create a new stran...Discusschatgpt
Kerwinfortriminator.hashnode.net·Feb 27, 2023WCB#9-Critical injection vulnerability found in Carbon Black App ControlWeekly Recap From a U.S. military data leak to fake air strike warnings in Russia, this week in Cyber ran the gamut of interesting stories. Some of these stories include: Sensitive US military emails spill online - An exposed server that was part of...DiscussWeekly Cyber Briefvmware
Kerwinfortriminator.hashnode.net·Feb 20, 2023WCB #8- Screenshot-based malware targets high value organizations in the U.S and Germany.Weekly Recap From meddling in elections to dangerous "disguised" Google ads, this week in Cyber had an array of engaging stories. Some of these stories include: Elections around the world manipulated by hackers - It has been reported that a unit of ...DiscussWeekly Cyber Briefphishing
Ifeadigo Wisdom NzekweforCyber Citymenovacity.hashnode.net·Feb 15, 2023Differences between Malware and Virus.Malware and viruses are two terms that are often used interchangeably when discussing computer security, but they are not the same thing. In fact, there are several key differences between malware and viruses that are important to understand in order...Discuss·46 readsdifference
Kerwinfortriminator.hashnode.net·Feb 6, 2023WCB #6 - The Hidden TrickGateWeekly Recap This week in cyber felt a bit dystopian if you ask me. Stories ranged from individuals being scanned with facial recognition to enter a stadium to security cameras not being as "secure" as they were marketed to be. Below is a list of eve...DiscussWeekly Cyber Brief#cybersecurity