Malware
Browse 14 cybersecurity tools tagged with "Malware"

Quad9
Intrusion Detection and Prevention Systems
Quad9 on SecurityListing: A free DNS recursive service that blocks malicious host names and protects user privacy.

Raven Runtime Prevention
Software Composition Analysis
Raven Runtime Prevention on SecurityListing: Runtime protection preventing supply-chain attacks & exploits via library-level policies

Phylum
Software Composition Analysis
Phylum on SecurityListing: Identifies 137 malicious npm packages and gathers system information to a remote server.

Userland API Monitoring
Digital Forensics and Incident Response
Userland API Monitoring and Code Injection Detection on SecurityListing: Explores malware interaction with Windows API and methods for detection and prevention.

June's Sophisticated npm
Industry Reports
June's Sophisticated npm Attack Attributed to North Korea on SecurityListing: A sophisticated npm attack attributed to North Korean threat actors, targeting technology firms and their employees.

ShadowServer
Threat Intelligence Platforms
ShadowServer on SecurityListing: A nonprofit security organization that collects and shares threat data to make the Internet more secure.

Comodo Advanced Endpoint
Endpoint Protection Platform
Comodo Advanced Endpoint Protection on SecurityListing: Advanced Endpoint Protection is a complete endpoint protection platform that provides advanced threat protection against ransomware, data breaches, and malware.

Maldatabase
Threat Intelligence Platforms
Maldatabase on SecurityListing: Maldatabase is a threat intelligence platform providing malware datasets and threat intelligence feeds for malware data science and threat intelligence.

Ryan Stillions: On
Threat Intelligence Platforms
Ryan Stillions: On TTPs on SecurityListing: In-depth analysis of real-world attacks and threat tactics

TeamTNT Targeting AWS,
Threat Intelligence Platforms
TeamTNT Targeting AWS, Alibaba on SecurityListing: TeamTNT is modifying its malicious shell scripts after they were made public by security researchers.

The Anatomy of
Guides
The Anatomy of a Malicious Package on SecurityListing: Educational resource analyzing the structure and implementation of malicious packages in software ecosystems, with focus on JavaScript/NPM threat models.

Sucuri Website Malware
Security Scanning
Sucuri Website Malware Scanner on SecurityListing: Website malware scanner with remote & server-side scanning capabilities

VX-Underground
Threat Intelligence Platforms
VX-Underground on SecurityListing: VX-Underground is a vast online repository of malware samples, featuring various collections for cybersecurity professionals and researchers to analyze and combat cyber threats.

Windows Commands Abused
Guides
Windows Commands Abused by Attackers on SecurityListing: Malware allows attackers to execute Windows commands from a remote environment