SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 43

Article thumbnail image

This post was originally published on Security Affairs. It can be found here.

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape

Inside Gamaredon’s PteroLNK: Dead Drop Resolvers and evasive Infrastructure

XRP supply chain attack: Official NPM package infected with crypto stealing backdoor 

SuperCard X: exposing a Chinese-speaker MaaS for NFC Relay fraud operation 

New Rust Botnet “RustoBot” is Routed via Routers  

Obfuscation Overdrive: Next-Gen Cryptojacking with Layers  

Android spyware trojan targets Russian military personnel who use Alpine Quest mapping software  

Operation SyncHole: Lazarus APT goes back to the well

Ransomware Groups Evolve Affiliate Models

North Korean Hackers Spread Malware via Fake Crypto Firms and Job Interview Lures

DslogdRAT Malware Installed in Ivanti Connect Secure  

Iran-Linked Hackers Target Israel with MURKYTOUR Malware via Fake Job Campaign

Reinforcement Learning for Mitigating Malware Propagation in Wireless Radar Sensor Networks with Channel Modeling

MAL-XSEL: Enhancing Industrial Web Malware Detection with an Explainable Stacking Ensemble Model

Zero Day Malware Detection with Alpha: Fast DBI with Transformer Models for Real World ApplicationAutomatically Generating Rules of Malicious Software Packages via Large Language Model

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, newsletter)

This post was originally published on this site

Forum Search

Partners & Sponsors
  • University of Baltimore
  • Towson University
  • Bureau of Justice Assistance
  • National Science Foundation
LATEST FORUM POSTS
Test post2

Test Post2

By Demo User12, 1 year ago

Finding internships

Hello, Has anyone here secured any forensic related internships for 2024? I'm collecting some data and wanted to know what...

By AP Malla, 1 year ago

Beginner network forensic investigation

How should I approach network forensic? Would you recommend learning tools like WireShark?

By AP Malla, 1 year ago

Cyber Forensic Employment: High level guidelines

Understand the Basics: Know the Field: Cyber forensics involves investigating digital crimes, analyzing electronic data, and recovering hidden, deleted, or...

By AP Malla, 1 year ago

LATEST POSTS