SECURITY AFFAIRS MALWARE NEWSLETTER – ROUND 28
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.
Finding Malware: Unveiling PLAYFULGHOST with Google Security Operations
Scam Sniffer 2024: Web3 Phishing Attacks – Wallet Drainers Drain $494 Million
EAGERBEE, with updated and novel components, targets the Middle East
Gayfemboy: A Botnet Deliver Through a Four-Faith Industrial Router 0-day Exploit
Top 5 Malware Threats to Prepare Against in 2025
Cracking the Code: How Banshee Stealer Targets macOS Users
Recruitment Phishing Scam Imitates CrowdStrike Hiring Process
Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware
Integrating Explainable AI for Effective Malware Detection in Encrypted Network Traffic
A Malware-Detection Method Using Deep Learning to Fully Extract API Sequence Features
Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, malware)
目录
最新
- Attackers used a public ASP.NET machine to conduct ViewState code injection attacks
- U.S. CISA adds Microsoft Outlook, Sophos XG Firewall, and other flaws to its Known Exploited Vulnerabilities catalog
- Cisco addressed two critical flaws in its Identity Services Engine (ISE)
- Notorious hacker behind 40+ cyberattacks on strategic organizations arrested
- Lazarus APT targets crypto wallets using cross-platform JavaScript stealer
- U.S. CISA adds Linux kernel flaw to its Known Exploited Vulnerabilities catalog
- U.S. CISA adds Microsoft .NET Framework, Apache OFBiz, and Paessler PRTG Network Monitor flaws to its Known Exploited Vulnerabilities catalog
- SparkCat campaign target crypto wallets using OCR to steal recovery phrases