{"id":167872,"date":"2024-09-01T09:09:18","date_gmt":"2024-09-01T09:09:18","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=167872"},"modified":"2024-09-01T09:09:20","modified_gmt":"2024-09-01T09:09:20","slug":"security-affairs-malware-newsletter-round-9","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/167872\/malware\/security-affairs-malware-newsletter-round-9.html","title":{"rendered":"SECURITY AFFAIRS MALWARE NEWSLETTER \u2013 ROUND 9"},"content":{"rendered":"
<\/div>\n

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.<\/h2>\n\n\n\n

Unveiling “sedexp”: A Stealthy Linux Malware Exploiting udev Rules<\/a><\/p>\n\n\n\n

Malware infiltrates Pidgin messenger\u2019s official plugin repository<\/a><\/p>\n\n\n\n

HZ Rat backdoor for macOS attacks users of China\u2019s DingTalk and WeChat<\/a>  <\/p>\n\n\n\n

BlackByte blends tried-and-true tradecraft with newly disclosed vulnerabilities to support ongoing attacks<\/a>  <\/p>\n\n\n\n

RansomHub ransomware-as-a-service<\/a> <\/p>\n\n\n\n

StopRansomware: RansomHub Ransomware<\/a>  <\/p>\n\n\n\n

The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers \u201cVoldemort\u201d<\/a><\/p>\n\n\n\n

Malware Identification Method in Industrial Control Systems Based on Opcode2vec and CVAE-GAN<\/a><\/p>\n\n\n\n

Android Malware Detection Based on RGB Images and Multi-feature Fusion<\/a>  <\/p>\n\n\n\n

Taking the Crossroads: The Versa Director Zero-Day Exploitation<\/a>\u00a0\u00a0 \u00a0\u00a0\u00a0\u00a0\u00a0<\/p>\n\n\n\n

Peach Sandstorm deploys new custom Tickler malware in long-running intelligence gathering operations<\/a><\/p>\n\n\n\n

Beware the Unpatchable: Corona Mirai Botnet Spreads via Zero-Day<\/a><\/gwmw><\/p>\n\n\n\n

Linux Detection Engineering –\u00a0 A Sequel on Persistence Mechanism<\/a>\u00a0\u00a0<\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/gwmw><\/p>\n\n\n\n

Pierluigi Paganin<\/strong><\/a><\/gwmw><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking,\u00a0newsletter<\/a>)<\/strong><\/gwmw><\/gwmw><\/gwmw><\/p>\n\n\n\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Unveiling “sedexp”: A Stealthy Linux Malware Exploiting udev Rules Malware infiltrates Pidgin messenger\u2019s official plugin repository HZ Rat backdoor for macOS attacks users of China\u2019s DingTalk and WeChat   BlackByte blends tried-and-true tradecraft with newly disclosed vulnerabilities […]<\/p>\n","protected":false},"author":1,"featured_media":165407,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,7],"tags":[88,4112,9508,9506,10918,30,3529,687,841,1533],"class_list":["post-167872","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-malware","tag-cybercrime","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-malware-2","tag-newsletter","tag-pierluigi-paganini","tag-security-affairs","tag-security-news"],"yoast_head":"\n杭州江阴科强工业胶带有限公司