SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 47

Article thumbnail image

This post was originally published on Security Affairs. It can be found here.

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape

60 Malicious npm Packages Leak Network and Host Data in Active Malware Campaign

Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Documents 

Inside a VenomRAT Malware Campaign

Fake Google Meet Page Tricks Users into Running PowerShell Malware

Dero miner zombies biting through Docker APIs to build a cryptojacking horde

PyBitmessage Backdoor Malware Installed with CoinMiner 

PumaBot: Novel Botnet Targeting IoT Surveillance Devices    

GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers  

Mark Your Calendar: APT41 Innovative Tactics

ViciousTrap – Infiltrate, Control, Lure: Turning edge devices into honeypots en masse   

Threat Intelligence NodeSnake Malware Campaign

The Sting of Fake Kling: Facebook Malvertising Lures Victims to Fake AI Generation Website 

Deep Dive into a Dumped Malware without a PE Header

Cybercriminals camouflaging threats as AI tool installers

Mac users beware – fake Ledger apps are being used by hackers to steal seed phrases and hack accounts

Chasing Eddies: New Rust- based InfoStealer used in CAPTCHA campaigns

Enhancing JavaScript Malware Detection through Weighted Behavioral DFAs

Aurora: Are Android Malware Classifiers Reliable under Distribution Shift?

A Transductive Zero-Shot Learning Framework for Ransomware Detection Using Malware Knowledge Graphs

Modeling and Analysis in the Industrial Internet with Dual Delay and Nonlinear Infection Rate

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, malware)

This post was originally published on this site

Forum Search

Partners & Sponsors
  • University of Baltimore
  • Towson University
  • Bureau of Justice Assistance
  • National Science Foundation
LATEST FORUM POSTS
Test post2

Test Post2

By Demo User12, 1 year ago

Finding internships

Hello, Has anyone here secured any forensic related internships for 2024? I'm collecting some data and wanted to know what...

By AP Malla, 1 year ago

Beginner network forensic investigation

How should I approach network forensic? Would you recommend learning tools like WireShark?

By AP Malla, 1 year ago

Cyber Forensic Employment: High level guidelines

Understand the Basics: Know the Field: Cyber forensics involves investigating digital crimes, analyzing electronic data, and recovering hidden, deleted, or...

By AP Malla, 2 years ago

LATEST POSTS