{"id":167525,"date":"2024-08-25T08:12:28","date_gmt":"2024-08-25T08:12:28","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=167525"},"modified":"2024-08-25T08:12:29","modified_gmt":"2024-08-25T08:12:29","slug":"security-affairs-malware-newsletter-round-8","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/167525\/malware\/security-affairs-malware-newsletter-round-8.html","title":{"rendered":"SECURITY AFFAIRS MALWARE NEWSLETTER \u2013 ROUND 8"},"content":{"rendered":"
<\/div>\n

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.<\/h2>\n\n\n\n

Meet UULoader: An Emerging and Evasive Malicious Installer<\/a><\/p>\n\n\n\n

BlindEagle flying high in Latin America<\/a>  <\/p>\n\n\n\n

Finding Malware: Unveiling NUMOZYLOD with Google Security Operations<\/a>      <\/p>\n\n\n\n

New Backdoor Targeting Taiwan Employs Stealthy Communications<\/a><\/p>\n\n\n\n

Unmasking Styx Stealer: How a Hacker\u2019s Slip Led to an Intelligence Treasure Trove<\/a>  <\/p>\n\n\n\n

PG_MEM: A Malware Hidden in the Postgres Processes<\/a>  <\/p>\n\n\n\n

NGate Android malware relays NFC traffic to steal cash<\/a>  <\/p>\n\n\n\n

From the Depths: Analyzing the Cthulhu Stealer Malware for macOS<\/a>  <\/p>\n\n\n\n

PEAKLIGHT: Decoding the Stealthy Memory-Only Malware<\/a>  <\/p>\n\n\n\n

Qilin ransomware caught stealing credentials stored in Google Chrome<\/a>  <\/p>\n\n\n\n

Zero Day Ransomware Detection with Pulse: Function Classification with Transformer Models and Assembly Language<\/a><\/p>\n\n\n\n

Achieving High Accuracy in Android Malware Detection through Genetic Programming Symbolic Classifier<\/a>  <\/p>\n\n\n\n

2024 Crypto Crime Mid-year Update Part 1: Cybercrime Climbs as Exchange Thieves and Ransomware Attackers Grow Bolder<\/a>\u00a0\u00a0 \u00a0\u00a0\u00a0<\/p>\n\n\n\n

The \u201cMad Liberator\u201d ransomware group leverages social-engineering moves to watch out for<\/a>\u00a0\u00a0<\/p>\n\n\n\n

Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset<\/a>\u00a0<\/p>\n\n\n\n

TodoSwift Disguises Malware Download Behind Bitcoin PDF<\/a>\u00a0\u00a0<\/p>\n\n\n\n

MoonPeak malware from North Korean actors unveils new details on attacker infrastructure<\/a>\u00a0\u00a0<\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/gwmw><\/p>\n\n\n\n

Pierluigi\u00a0Paganin<\/strong><\/a><\/gwmw><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking,\u00a0newsletter<\/a>)<\/strong><\/p>\n\n\n\n

<\/gwmw><\/gwmw><\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Meet UULoader: An Emerging and Evasive Malicious Installer BlindEagle flying high in Latin America   Finding Malware: Unveiling NUMOZYLOD with Google Security Operations       New Backdoor Targeting Taiwan Employs Stealthy Communications Unmasking Styx Stealer: How a Hacker\u2019s […]<\/p>\n","protected":false},"author":1,"featured_media":165407,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,7],"tags":[],"class_list":["post-167525","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-malware"],"yoast_head":"\n杭州江阴科强工业胶带有限公司