{"id":165712,"date":"2024-07-14T17:01:16","date_gmt":"2024-07-14T17:01:16","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=165712"},"modified":"2024-07-14T17:01:18","modified_gmt":"2024-07-14T17:01:18","slug":"security-affairs-malware-newsletter-round-2","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/165712\/malware\/security-affairs-malware-newsletter-round-2.html","title":{"rendered":"<\/gwmw>Security Affairs Malware Newsletter – Round 2<\/gwmw>"},"content":{"rendered":"
<\/div>\n

Security Affairs Malware<\/a> newsletter includes a collection of the best articles and research on malware in the international landscape.<\/h2>\n\n\n\n

New Android Spyware Steals Data from Gamers and TikTok Users<\/a>  <\/p>\n\n\n\n

A Wolf in Sheep’s Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild<\/a><\/p>\n\n\n\n

Mekotio Banking Trojan Threatens Financial Systems in Latin America<\/a>  <\/p>\n\n\n\n

UNVEILING AZZASEC RANSOMWARE: TECHNICAL INSIGHTS INTO THE GROUP\u2019S LOCKER<\/a>  <\/p>\n\n\n\n

Decrypted: DoNex Ransomware and its Predecessors<\/a><\/p>\n\n\n\n

Persistent npm Campaign Shipping Trojanized jQuery<\/a>     <\/p>\n\n\n\n

The Mechanics of ViperSoftX: Exploiting AutoIt and CLR for Stealthy PowerShell Execution<\/a>   <\/p>\n\n\n\n

Malware Classification Using Dynamically Extracted API Call Embeddings<\/a><\/p>\n\n\n\n

Turning Jenkins Into a Cryptomining Machine From an Attacker’s Perspective<\/a><\/p>\n\n\n\n

Patch or Peril: A Veeam vulnerability incident<\/a><\/p>\n\n\n\n

RESURRECTING INTERNET EXPLORER: THREAT ACTORS USING ZERO-DAY TRICKS IN INTERNET SHORTCUT FILE TO LURE VICTIMS (CVE-2024-38112)<\/a>     <\/p>\n\n\n\n

CVE-2024-4577 Exploits in the Wild One Day After Disclosure<\/a> <\/p>\n\n\n\n

Malware Trends Report: Q2, 2024<\/a>       <\/p>\n\n\n\n

New Malware Campaign Targeting Spanish Language Victims<\/a><\/p>\n\n\n\n

DodgeBox: A deep dive into the updated arsenal of APT41 | Part 1<\/a><\/p>\n\n\n\n

Malicious NuGet campaign uses homoglyphs and IL weaving to fool devs<\/a>          <\/p>\n\n\n\n

DarkGate: Dancing the Samba With Alluring Excel Files<\/a>\u00a0\u00a0\u00a0<\/gwmw><\/p>\n\n\n\n

Follow me on LinkedIn and subscribe to the Newsletter to receive it for free every week.<\/gwmw><\/gwmw><\/gwmw><\/gwmw><\/h2>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/gwmw><\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking,\u00a0newsletter)<\/strong><\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. New Android Spyware Steals Data from Gamers and TikTok Users   A Wolf in Sheep’s Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild Mekotio Banking Trojan Threatens Financial Systems in Latin America   UNVEILING […]<\/p>\n","protected":false},"author":1,"featured_media":165407,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,7],"tags":[88,4112,9508,9506,10918,30,3529,687,841,1533],"class_list":["post-165712","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-malware","tag-cybercrime","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-malware-2","tag-newsletter","tag-pierluigi-paganini","tag-security-affairs","tag-security-news"],"yoast_head":"\n杭州江阴科强工业胶带有限公司