This post was originally published on Security Affairs. It can be found here.
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape
60 Malicious npm Packages Leak Network and Host Data in Active Malware Campaign
Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Documents
Inside a VenomRAT Malware Campaign
Fake Google Meet Page Tricks Users into Running PowerShell Malware
Dero miner zombies biting through Docker APIs to build a cryptojacking horde
PyBitmessage Backdoor Malware Installed with CoinMiner
PumaBot: Novel Botnet Targeting IoT Surveillance Devices
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
Mark Your Calendar: APT41 Innovative Tactics
ViciousTrap – Infiltrate, Control, Lure: Turning edge devices into honeypots en masse
Threat Intelligence NodeSnake Malware Campaign
The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website
Deep Dive into a Dumped Malware without a PE Header
Cybercriminals camouflaging threats as AI tool installers
Mac users beware – fake Ledger apps are being used by hackers to steal seed phrases and hack accounts
Chasing Eddies: New Rust- based InfoStealer used in CAPTCHA campaigns
Enhancing JavaScript Malware Detection through Weighted Behavioral DFAs
Aurora: Are Android Malware Classifiers Reliable under Distribution Shift?
A Transductive Zero-Shot Learning Framework for Ransomware Detection Using Malware Knowledge Graphs
Modeling and Analysis in the Industrial Internet with Dual Delay and Nonlinear Infection Rate
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, malware)
This post was originally published on this site