{"id":166014,"date":"2024-07-21T13:31:24","date_gmt":"2024-07-21T13:31:24","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=166014"},"modified":"2024-07-21T13:35:51","modified_gmt":"2024-07-21T13:35:51","slug":"security-affairs-malware-newsletter-round-3","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/166014\/malware\/security-affairs-malware-newsletter-round-3.html","title":{"rendered":"Security Affairs Malware Newsletter – Round 3"},"content":{"rendered":"
<\/div>\n

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.<\/h2>\n\n\n\n

Hardening of HardBit<\/a>   <\/p>\n\n\n\n

10,000 Victims a Day: Infostealer Garden of Low-Hanging Fruit<\/a><\/p>\n\n\n\n

This Meeting Should Have Been an Email<\/a>  <\/p>\n\n\n\n

Ransomware Detection Model Based on Adaptive Graph Neural Network Learning<\/a><\/p>\n\n\n\n

SEXi ransomware rebrands to APT INC, continues VMware ESXi attacks<\/a>  <\/p>\n\n\n\n

Facebook ads for Windows desktop themes push info-stealing malware<\/a><\/p>\n\n\n\n

Akira Ransomware Targets the LATAM Airline Industry<\/a><\/p>\n\n\n\n

Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models<\/a><\/p>\n\n\n\n

NEW BUGSLEEP BACKDOOR DEPLOYED IN RECENT MUDDYWATER CAMPAIGNS<\/a>  <\/p>\n\n\n\n

MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign<\/a><\/p>\n\n\n\n

Fake AWS Packages Ship Command and Control Malware In JPEG Files<\/a>      <\/p>\n\n\n\n

Microsoft links Scattered Spider hackers to Qilin ransomware attacks<\/a><\/p>\n\n\n\n

Qilin Revisited: Diving into the techniques and procedures of the recent Qilin Ransomware Attacks<\/a>  <\/p>\n\n\n\n

North Korean Hackers Update BeaverTail Malware to Target MacOS Users<\/a><\/p>\n\n\n\n

HotPage: Story of a signed, vulnerable, ad-injecting driver<\/a>  <\/p>\n\n\n\n

MoonWalk: A deep dive into the updated arsenal of APT41 | Part 2<\/a>    <\/strong><\/gwmw><\/p>\n\n\n\n

Follow me on LinkedIn and subscribe to the Newsletter to receive it for free every week.<\/gwmw><\/gwmw><\/gwmw><\/gwmw><\/gwmw><\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/gwmw><\/gwmw><\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a> \u2013<\/strong> hacking, newsletter)<\/strong><\/gwmw><\/gwmw><\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Hardening of HardBit    10,000 Victims a Day: Infostealer Garden of Low-Hanging Fruit This Meeting Should Have Been an Email   Ransomware Detection Model Based on Adaptive Graph Neural Network Learning SEXi ransomware rebrands to APT INC, continues […]<\/p>\n","protected":false},"author":1,"featured_media":165407,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,7],"tags":[],"class_list":["post-166014","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-malware"],"yoast_head":"\n杭州江阴科强工业胶带有限公司