Today's Core Dump is brought to you by ThreatPerspective

Security Affairs

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 17

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. New Bumblebee Loader Infection Chain Signals Possible Resurgence    Trojanized Ethers Forks on npm Attempting to Steal Ethereum […] Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. New Bumblebee Loader Infection Chain Signals Possible Resurgence    Trojanized Ethers Forks on npm Attempting to Steal Ethereum Private Keys   Threat Actors Push ClickFix Fake Browser Updates Using Stolen Credentials   Inside the Latrodectus Malware Campaign   Grandoreiro, the global trojan with grandiose goals   New Qilin.B Ransomware Variant Boasts Enhanced Encryption and Defense Evasion    ReliaQuest Uncovers New Black Basta Social Engineering Technique   Unmasking Lumma Stealer: Analyzing Deceptive Tactics with Fake CAPTCHA   TeamTNT’s Docker Gatling Gun Campaign From cyber attacks to sabotage: How Israel’s covert operations are targeting Iran’s vital assets   Enhancing Online Security: A Novel Machine Learning Framework for Robust Detection of Known and Unknown Malicious URLs Binary Code Similarity Detection via Graph Contrastive Learning on Intermediate Representations RDP configuration files as a means of obtaining remote access to a computer or “Rogue RDP” (CERT-UA#11690) Threat actor abuses Gophish to deliver new PowerRAT and DCRAT Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach “Hey ESET, Wait for the Leak”: Dissecting the “OctoberSeventh” Wiper targeting ESET customers in Israel Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs hacking, newsletter)

Published: 2024-10-27T13:54:47











© Segmentation Fault . All rights reserved.

Privacy | Terms of Use | Contact Us