SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 40

Article thumbnail image

This post was originally published on Security Affairs. It can be found here.

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape

CISA Releases Malware Analysis Report on RESURGE Malware Associated with Ivanti Connect Secure  

Unboxing Anubis: Exploring the Stealthy Tactics of FIN7’s Latest Backdoor 

Advancements in delivery: Scripting with Nietzsche  

Analyzing New HijackLoader Evasion Tactics  

Malicious Python packages target popular Bitcoin library 

New version of Triada steals cryptocurrency, messenger accounts and replaces phone numbers during calls

Hidden Malware Strikes Again: Mu-Plugins Under Attack 

Gamaredon campaign abuses LNK files to distribute Remcos backdoor

DarkCloud Malware Analysis

The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques

UAC-0219: Cyber ​​espionage using PowerShell stealer WRECKSTEEL

MaLAware: Automating the Comprehension of Malicious Software Behaviours using Large Language Models (LLMs)

Advanced Financial Fraud Malware Detection Method in the Android Environment

AOAFS: A Malware Detection System Using an Improved Arithmetic Optimization Algorithm

Identifying Obfuscated Code through Graph-Based Semantic Analysis of Binary Code

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, malware)

This post was originally published on this site

Forum Search

Partners & Sponsors
  • University of Baltimore
  • Towson University
  • Bureau of Justice Assistance
  • National Science Foundation
LATEST FORUM POSTS
Test post2

Test Post2

By Demo User12, 1 year ago

Finding internships

Hello, Has anyone here secured any forensic related internships for 2024? I'm collecting some data and wanted to know what...

By AP Malla, 1 year ago

Beginner network forensic investigation

How should I approach network forensic? Would you recommend learning tools like WireShark?

By AP Malla, 1 year ago

Cyber Forensic Employment: High level guidelines

Understand the Basics: Know the Field: Cyber forensics involves investigating digital crimes, analyzing electronic data, and recovering hidden, deleted, or...

By AP Malla, 1 year ago

LATEST POSTS