Predator Spyware Infrastructure Returns Following Exposure and Sanctions<\/a><\/p>\n\n\n\n
Mallox ransomware: in-depth analysis and evolution<\/a> <\/p>\n\n\n\n
A glimpse into the Quad7 operators\u2019 next moves and associated botnets<\/a> <\/p>\n\n\n\n
CosmicBeetle steps up: Probation period at RansomHub<\/a> <\/p>\n\n\n\n
New RansomHub attack uses TDSKiller and LaZagne, disables EDR<\/a> <\/p>\n\n\n\n
Hadooken Malware Targets Weblogic Applications<\/a><\/p>\n\n\n\n
Ajina attacks Central Asia: Story of an Uzbek Android Pandemic<\/a> <\/p>\n\n\n\n
Void captures over a million Android TV boxes<\/a><\/p>\n\n\n\n
A new TrickMo saga: from Banking Trojan to Victim’s Data Leak<\/a> <\/p>\n\n\n\n
Earth Preta Evolves its Attacks with New Malware and Strategies<\/a> <\/p>\n\n\n\n
Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401<\/a><\/p>\n\n\n\n
TIDRONE Targets Military and Satellite Industries in Taiwan<\/a>
Fake recruiter coding tests target devs with malicious Python packages<\/a> Targeted Iranian Attacks Against Iraqi Government Infrastructure<\/a> <\/strong>
Follow me on Twitter:\u00a0@securityaffairs<\/strong><\/a>\u00a0and\u00a0Facebook<\/strong><\/a>\u00a0and\u00a0Mastodon<\/a>
Pierluigi\u00a0Paganini<\/strong><\/a>
(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking,\u00a0newsletter)<\/strong><\/p>\n\n\n\n