Search
Subscribe
News Deep Dives Hunting Education Intel

ANNOUNCEMENTS

Introducing malware[.]net

Consolidating malware knowledge and information into one place will help cybersecurity professionals of all experience levels fight against malware.

By Ryan Victory

Mar 1st, 2023 · 1 minute read

Art via DALL-E


Introducing malware[.]net: your single source for Malware News, Cybersecurity Threat Hunting Resources, Tools, Threat Intel, and more. All malware, all the time. This site is just getting started, but we have big plans! Be on the lookout for:

  • A feed of malware news, aggregated from first party and third party sources across the web
  • In depth analysis of important malware stories, including key learnings to help you better secure your environment
  • Educational and training material on how malware works, reverse engineering, threat hunting, and more
  • Threat indicators and signatures available in structured formats for you to use when protecting your environment

Our goal with malware[.]net is to consolidate as much information about malware as possible. With the constantly increasing need for qualified cybersecurity professionals and the growing threat from adversaries, we want to level the playing field against attackers by giving all defenders the information they need to secure their environments from threats. We want malware[.]net to be the first place that new and seasoned cybersecurity professionals alike turn to when they want to learn the latest about malware threats.

About the malware[.]net name

malware[.]net is pronounced “malware DOT net”

The malware[.]net name is a play on the cybersecurity tradition of “defanging” domain names and URLs before sharing them. Defanging is the process of ensuring that URLs and domain names aren’t accidentally visited. This is often done by surrounding the periods in the domain name with square brackets, hence “malware[.]net”

So much more to come

We want to provide you with high quality long-form information about all things related to malware. This will take time, so please bear with us while we build out our material. If you want to be notified when we have new posts, please subscribe. We promise we won’t use your email address for anything except notifications about new posts and content.

This undertaking won’t be possible alone. If you are interested in contributing an article (or a few!) to malware[.]net, please email us at contact@malware.net.


More malware news from across the Internet
View More
MALVERTISING
BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads - The Hacker News

Mar 11th, 2023
thehackernews.com

INFOSTEALING KEYLOGGING
Malware Targets People Looking to Pirate Oscar-Nominated Films - Dark Reading

Mar 10th, 2023
www.darkreading.com

MACOS
Pirated copies of Final Cut Pro infect Macs with cryptojacking malware - Graham Cluley

Mar 10th, 2023
grahamcluley.com

ANDROID FINANCE BANKING TROJAN
Xenomorph Android malware now steals data from 400 banks - BleepingComputer

Mar 10th, 2023
www.bleepingcomputer.com

APT MALSPAM NORTH KOREA
North Korean UNC2970 Hackers Expands Operations with New Malware Families - The Hacker News

Mar 10th, 2023
thehackernews.com

View More

About
Malware Glossary
Privacy
Terms

Subscribe to malware[.]net

We'll never share your email with anyone else.

Questions or comments? contact@malware.net
Copyright ©2025 malware[.]net

Back to top