Skip to content
HiveSecurity
  • Home
  • Blog
  • Tags
  • Vulnerabilities
    • Tools
    • Cheat Sheet
    • Security Guides
  • Contact
  • About
Esc
Type to search...
  • Home
  • Blog
  • Tags
  • Vulnerabilities
  • Resources
  • Tools
  • Cheat Sheet
  • Security Guides
  • Contact
  • About
← All tags Tag

Malware Analysis

28 articles

Unmasking TeamPCP: The Supply Chain Saboteurs and the Trails They Left Behind

TeamPCP has compromised hundreds of open-source packages and stolen half a million credentials. But their OPSEC is leaking — and someone is already hunting them.

15 May 2026
Threat Intelligence Supply Chain Attribution

When the Weapon Learns: How Nation-States Weaponized AI Across the Full Attack Chain

Google GTIG's May 2026 report documents a turning point: state actors now use AI to write zero-day exploits, build self-navigating backdoors, and poison the AI supply chain itself.

11 May 2026
Threat Intelligence Malware Analysis Red Team

CallPhantom: How 28 Fake Apps Collected Payments for Data That Never Existed

ESET uncovered CallPhantom — 28 Android apps with 7.3M downloads that sold fabricated call histories. A deep dive into the fraud mechanics, billing bypass, and how to protect yourself.

8 May 2026
Malware Analysis Threat Intelligence Mobile Security

The World's Most Dangerous Hacking Teams: A Guide to Nation-State APT Groups

Meet the elite state-sponsored hacking groups that stole billions, blacked out cities, and infiltrated governments. Who they are, what they want, and how they operate in 2026.

7 May 2026
Threat Intelligence Cybersecurity Malware Analysis

AutoHotkey Malware Loaders: How Attackers Weaponize Automation Scripts

AutoHotkey isn't just for productivity scripts — attackers use it as a stealthy malware loader. Learn how AHK-based campaigns work and how to detect them.

7 May 2026
Malware Analysis Detection Red Team

Browser Vendors Fail Users: Millions Infected, Zero Notifications Sent

840,000 GhostPoster victims, 3.2M+ in GitLab campaign, 4.3M+ in ShadyPanda—browser vendors removed extensions but never told users. Self-regulation failed.

7 May 2026
Cybersecurity Supply Chain Malware Analysis

BYOVD: How Attackers Use Legitimate Drivers to Kill Your Security Tools

BYOVD (Bring Your Own Vulnerable Driver) lets attackers reach the Windows kernel using signed, legitimate drivers — and then silently kill your EDR before ransomware drops.

7 May 2026
Red Team Blue Team Malware Analysis

Cobalt Strike Detection & Hunting: A Defender's Playbook

How to detect Cobalt Strike beacons in your environment — network fingerprints, process injection patterns, Sigma rules, and practical hunting queries for blue teams.

7 May 2026
Blue Team Cobalt Strike Threat Hunting

DFIR in 2026: A Complete Guide to Digital Forensics and Incident Response

From initial alert to post-incident report — a professional walkthrough of DFIR methodology, evidence collection, memory forensics, Windows artifacts, and response playbooks.

7 May 2026
Blue Team Incident Response Digital Forensics

The Digital Parasite: How Attacker Tradecraft Evolved in 2026

80% of top MITRE ATT&CK techniques now focus on evasion and persistence. Attackers abandoned smash-and-grab for long-term parasitic operations in networks.

7 May 2026
Cybersecurity Lateral Movement MITRE ATT&CK

Invisible Characters as an Attack Vector

Unicode's invisible characters are being weaponized — hiding malicious code in repositories, hijacking AI agents, and bypassing security reviews without leaving a trace visible to human eyes.

7 May 2026
Cybersecurity Web Security Red Team

Kimwolf Botnet: 2 Million Hijacked Devices Reshaping Threat Landscape

The Kimwolf botnet has compromised over 2 million devices worldwide by exploiting residential proxy networks and unsecured Android TV boxes. Here's what threat intelligence reveals about its infrastructure, tactics, and how to defend against it.

7 May 2026
Cybersecurity Malware Analysis Threat Intelligence

Trust Me, I'm a Shortcut: How LNK Files Lie to Windows Explorer

Windows .lnk shortcut files can show one target while silently executing another. Discover five spoofing techniques including CVE-2025-9491, how attackers exploit them, and how to detect them.

7 May 2026
Red Team Blue Team Windows Security

LOLBins in 2026: How Attackers Use Windows Against Itself

79% of attacks in 2024 used no malware at all. Attackers abuse Windows' own built-in tools — certutil, mshta, rundll32 — to execute code and evade detection. Here's the full attack playbook and how to detect it.

7 May 2026
Red Team Blue Team Detection

macOS Offensive Security: How Attackers Exploit Apple's Unique Attack Surface

TCC bypass, Keychain theft, Launch Agent persistence, dylib hijacking — how attackers target macOS and how defenders detect them. Attack→Detect with real commands.

7 May 2026
Red Team Blue Team Detection

The Package You Trusted: How the Axios Supply Chain Attack Happened

On March 31, 2026, a trusted npm package with 400 million monthly downloads was backdoored for three hours. Here's how it worked and why it keeps happening.

7 May 2026
Cybersecurity Supply Chain Malware Analysis

NTFS Alternate Data Streams: How Attackers Hide in Plain Sight

NTFS Alternate Data Streams let attackers hide executables inside innocent-looking files. Learn how ADS works, how malware uses it, and how to detect it with PowerShell, Sysinternals, and Sysmon.

7 May 2026
Red Team Blue Team Windows Security

OpenClaw: How the Viral AI Agent Became 2026's First Major Security Crisis

OpenClaw went from 0 to 180,000 GitHub stars in weeks — and then came the RCE, 30,000 exposed instances, and a supply chain attack poisoning its entire skill marketplace.

7 May 2026
Cybersecurity Malware Analysis Supply Chain

State-Sponsored Threat Actors 2026: Who They Are and What They Do

A threat intelligence deep-dive into the world's most dangerous state-sponsored APT groups — their identities, motivations, campaigns, and tradecraft in 2026.

7 May 2026
Threat Intelligence APT Nation-State

UEFI Bootkits: The Malware That Lives Below Your Operating System

UEFI bootkits survive OS reinstalls, hide from every AV and EDR tool, and can bypass Secure Boot on fully-patched systems. Here's how they work and what you can do about it.

7 May 2026
Malware Analysis Firmware Security Threat Intelligence

When Your Defender Becomes the Attacker: How Trusted Windows Processes Get Weaponized

Windows Defender and other high-privilege system processes are increasingly targeted by attackers. Learn how security tools become attack surfaces — and what you can do about it.

7 May 2026
Windows Security Privilege Escalation Cybersecurity

Xanthorox AI: When the Attacker's AI Goes Dark

Xanthorox is an offline, modular AI attack platform with five specialized models — and it needs no cloud, no API, and leaves no traditional IoCs. Here's what defenders need to know.

7 May 2026
Cybersecurity Malware Analysis AI Security

Zombie ZIP: How a Malformed Archive Header Blinds 98% of Antivirus Engines

CVE-2026-0866 — a single two-byte header manipulation causes 50 of 51 AV engines to scan compressed noise instead of the actual payload. Technical breakdown, attack scenarios, and detection.

7 May 2026
Malware Analysis Red Team Detection

Memory Forensics with Volatility 3: What Attackers Leave Behind

How attackers hide in RAM using fileless malware and process injection — and how defenders use Volatility 3 to find them. Practical DFIR workflow with real commands.

30 April 2026
Malware Analysis Blue Team Detection

zipguard: Safe ZIP Extraction With Zero Dependencies

ZIP archives are a common malware delivery vector. zipguard is a zero-dependency Python CLI that blocks ZipSlip, archive bombs, executable drops, and ZIP64 manipulation before anything hits disk.

16 April 2026
Tools Supply Chain Blue Team

Modern Windows Attack Techniques in 2026: Evasion, Delivery, and Stealth

A structured guide to modern Windows attack techniques — BYOVD EDR evasion, LOLBins, invisible character injection, ClickFix delivery, NTFS steganography, and C2 over trusted cloud services. How they work, how to detect them.

8 April 2026
Red Team Blue Team Malware Analysis

Cookie-Controlled PHP Webshells: A Stealthy Tradecraft in Linux Hosting Environments

Microsoft's Defender team uncovered a clever attacker technique: PHP webshells that stay completely dormant until activated by a secret HTTP cookie. Here's how it works — and how to catch it.

4 April 2026
Web Security Red Team Blue Team

Telegram as a C2 Server: How It Works and How to Detect It

Attackers use Telegram's Bot API as command-and-control infrastructure — no Telegram install needed on the victim machine. Here's the mechanics, real-world examples, and blue team detection strategies.

23 March 2026
Cybersecurity Blue Team Malware Analysis
HiveSecurity

Offensive thinking. Defensive expertise.

Content
  • Home
  • Blog
  • Tags
  • Vulnerabilities
Resources
  • Tools
  • Cheat Sheet
  • Security Guides
Company
  • Contact
  • About
  • RSS
  • Privacy

© 2026 Hive Security. All rights reserved.

Built with zero trust & least privilege