SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 34

Article thumbnail image

This post was originally published on Security Affairs. It can be found here.

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.

You’ve Got Malware: FINALDRAFT Hides in Your Drafts  

Telegram Abused as C2 Channel for New Golang Backdoor  

Infostealing Malware Infections in the U.S. Military & Defense Sector: A Cybersecurity Disaster in the Making  

Analyzing ELF/Sshdinjector.A!tr with a Human and Artificial Analyst  

An Update on Fake Updates: Two New Actors, and New Mac Malware  

FortiSandbox 5.0 Detects Evolving Snake Keylogger Variant  

XLoader Executed Through JAR Signing Tool (jarsigner.exe)  

SPYLEND: The Android App Available on Google Play Store: Enabling Financial Cyber Crime & Extortion  

Cluster Analysis and Concept Drift Detection in Malware

LAMD: Context-driven Android Malware Detection and Classification with LLMs

Improving Cyber Defense Against Ransomware: A Generative Adversarial Networks-Based Adversarial Training Approach for Long Short-Term Memory Network Classifier

DeceptiveDevelopment targets freelance developers  

Meet NailaoLocker: a ransomware distributed in Europe by ShadowPad and PlugX backdoors  

Earth Preta Mixes Legitimate and Malicious Components to Sidestep Detection

StaryDobry ruins New Year’s Eve, delivering miner instead of presents

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, malware)

This post was originally published on this site

Forum Search

Partners & Sponsors
  • University of Baltimore
  • Towson University
  • Bureau of Justice Assistance
  • National Science Foundation
LATEST FORUM POSTS
Test post2

Test Post2

By Demo User12, 1 year ago

Finding internships

Hello, Has anyone here secured any forensic related internships for 2024? I'm collecting some data and wanted to know what...

By AP Malla, 1 year ago

Beginner network forensic investigation

How should I approach network forensic? Would you recommend learning tools like WireShark?

By AP Malla, 1 year ago

Cyber Forensic Employment: High level guidelines

Understand the Basics: Know the Field: Cyber forensics involves investigating digital crimes, analyzing electronic data, and recovering hidden, deleted, or...

By AP Malla, 1 year ago

LATEST POSTS