SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 49

Article thumbnail image

This post was originally published on Security Affairs. It can be found here.

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape

Supply chain attack hits Gluestack NPM packages with 960K weekly downloads  

Analysis of the latest Mirai wave exploiting TBK DVR devices with CVE-2024-3721  

Destructive npm Packages Disguised as Utilities Enable Remote System Wipe

AMOS Variant Distributed Via Clickfix In Spectrum-Themed Dynamic Delivery Campaign By Russian Speaking Hackers   

Demystifying Myth Stealer: A Rust Based InfoStealer 

DanaBleed: DanaBot C2 Server Memory Leak Bug  

Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability  

From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery 

JSFireTruck: Exploring Malicious JavaScript Using JSF*ck as an Obfuscation Technique  

Fog Ransomware: Unusual Toolset Used in Recent Attack 

Operation Phantom Enigma

Graphite Caught First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted     

Empirical Quantification of Spurious Correlations in Malware Detection

Striking Back At Cobalt: Using Network Traffic Metadata To Detect Cobalt Strike Masquerading Command and Control Channels

A Survey on Reinforcement Learning-Driven Adversarial Sample Generation for PE Malware

Crypto-Ransomware Detection Through a Honeyfile-Based Approach with R-Locker

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, malware)

This post was originally published on this site

Forum Search

Partners & Sponsors
  • University of Baltimore
  • Towson University
  • Bureau of Justice Assistance
  • National Science Foundation
LATEST FORUM POSTS
Test post2

Test Post2

By Demo User12, 2 years ago

Finding internships

Hello, Has anyone here secured any forensic related internships for 2024? I'm collecting some data and wanted to know what...

By AP Malla, 2 years ago

Beginner network forensic investigation

How should I approach network forensic? Would you recommend learning tools like WireShark?

By AP Malla, 2 years ago

Cyber Forensic Employment: High level guidelines

Understand the Basics: Know the Field: Cyber forensics involves investigating digital crimes, analyzing electronic data, and recovering hidden, deleted, or...

By AP Malla, 2 years ago

LATEST POSTS