SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 84
Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape
Malware Newsletter
Stan Ghouls targeting Russia and Uzbekistan with NetSupport RAT
Breaking Down ZeroDayRAT – New Spyware Targeting Android and iOS
Old-School IRC, New Victims: Inside the Newly Discovered SSHStalker Linux Botnet
Reynolds: Defense Evasion Capability Embedded in Ransomware Payload
AgreeToSteal: The First Malicious Outlook Add-In Leads to 4,000 Stolen Credentials
LummaStealer Is Getting a Second Life Alongside CastleLoader
BADIIS to the Bone: New Insights to a Global SEO Poisoning Campaign
New threat actor, UAT-9921, leverages VoidLink framework in campaigns
Fake recruiter campaign targets crypto devs
LoRA-based Parameter-Efficient LLMs for Continuous Learning in Edge-based Malware Detection
LLM-FS: Zero-Shot Feature Selection for Effective and Interpretable Malware Detection
Image-Based Malware Classification Using DCGAN-Augmented Data and a CNN–Transformer Hybrid Model
Real-Time Ransomware Detection Using Reinforcement Learning Agents
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – malware, newsletter)
目录
最新
- Iran-linked MuddyWater deploys Dindoor malware against U.S. organizations
- Cisco flags ongoing exploitation of two recently patched Catalyst SD-WAN flaws
- Microsoft warns of ClickFix campaign exploiting Windows Terminal to deliver Lumma Stealer
- Iran-nexus APT Dust Specter targets Iraq officials with new malware
- U.S. CISA adds Apple, Rockwell, and Hikvision flaws to its Known Exploited Vulnerabilities catalog
- Google GTIG: 90 zero-day flaws exploited in 2025 as enterprise targets grow
- Phobos Ransomware admin faces up to 20 years after guilty plea
- Russian APT targets Ukraine with BadPaw and MeowMeow malware