{"id":168406,"date":"2024-09-15T11:12:09","date_gmt":"2024-09-15T11:12:09","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=168406"},"modified":"2024-09-22T13:50:40","modified_gmt":"2024-09-22T13:50:40","slug":"security-affairs-malware-newsletter-round-11","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/168406\/malware\/security-affairs-malware-newsletter-round-11.html","title":{"rendered":"SECURITY AFFAIRS MALWARE NEWSLETTER \u2013 ROUND 11"},"content":{"rendered":"
<\/div>\n

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.<\/h2>\n\n\n\n

Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights<\/a>  <\/p>\n\n\n\n

Dissecting Lumma Malware: Analyzing the Fake CAPTCHA and Obfuscation Techniques – Part 2<\/a>  <\/p>\n\n\n\n

Predator Spyware Infrastructure Returns Following Exposure and Sanctions<\/a><\/p>\n\n\n\n

Malware\u2019s Shared Secrets: Code Similarity Insights for Ransomware Gangs Activities Tracking<\/a>      <\/p>\n\n\n\n

Mallox ransomware: in-depth analysis and evolution<\/a>  <\/p>\n\n\n\n

A glimpse into the Quad7 operators\u2019 next moves and associated botnets<\/a>  <\/p>\n\n\n\n

CosmicBeetle steps up: Probation period at RansomHub<\/a>  <\/p>\n\n\n\n

New RansomHub attack uses TDSKiller and LaZagne, disables EDR<\/a>  <\/p>\n\n\n\n

Hadooken Malware Targets Weblogic Applications<\/a><\/p>\n\n\n\n

Ajina attacks Central Asia: Story of an Uzbek Android Pandemic<\/a>      <\/p>\n\n\n\n

Void captures over a million Android TV boxes<\/a><\/p>\n\n\n\n

Applications of Fuzzy Logic and Probabilistic Neural Networks in E-Service for Malware Detection<\/a><\/p>\n\n\n\n

A new TrickMo saga: from Banking Trojan to Victim’s Data Leak<\/a>    <\/p>\n\n\n\n

Earth Preta Evolves its Attacks with New Malware and Strategies<\/a> <\/p>\n\n\n\n

Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401<\/a><\/p>\n\n\n\n

TIDRONE Targets Military and Satellite Industries in Taiwan<\/a><\/gwmw><\/p>\n\n\n\n

Fake recruiter coding tests target devs with malicious Python packages<\/a> Targeted Iranian Attacks Against Iraqi Government Infrastructure<\/a>   <\/strong><\/gwmw><\/p>\n\n\n\n

Follow me on Twitter:\u00a0@securityaffairs<\/strong><\/a>\u00a0and\u00a0Facebook<\/strong><\/a>\u00a0and\u00a0Mastodon<\/a><\/gwmw><\/gwmw><\/p>\n\n\n\n

Pierluigi\u00a0Paganini<\/strong><\/a><\/gwmw><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking,\u00a0newsletter)<\/strong><\/p>\n\n\n\n

<\/p>\n","protected":false},"excerpt":{"rendered":"

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Mythical Beasts and Where to Find Them: Mapping the Global Spyware Market and its Threats to National Security and Human Rights   Dissecting Lumma Malware: Analyzing the Fake CAPTCHA and Obfuscation Techniques – Part 2   Predator Spyware […]<\/p>\n","protected":false},"author":1,"featured_media":165407,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,7],"tags":[88,4112,9508,9506,10918,30,3529,687,841,1533],"class_list":["post-168406","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-malware","tag-cybercrime","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-malware-2","tag-newsletter","tag-pierluigi-paganini","tag-security-affairs","tag-security-news"],"yoast_head":"\n杭州江阴科强工业胶带有限公司