{"id":169427,"date":"2024-10-06T13:16:37","date_gmt":"2024-10-06T13:16:37","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=169427"},"modified":"2024-10-06T13:16:39","modified_gmt":"2024-10-06T13:16:39","slug":"security-affairs-malware-newsletter-round-14","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/169427\/malware\/security-affairs-malware-newsletter-round-14.html","title":{"rendered":"SECURITY AFFAIRS MALWARE NEWSLETTER \u2013 ROUND 14"},"content":{"rendered":"
<\/div>\n

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.<\/h2>\n\n\n\n

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.<\/strong><\/p>\n\n\n\n

Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0<\/a><\/p>\n\n\n\n

Threat Actors leverage Docker Swarm and Kubernetes to mine cryptocurrency at scale<\/a>  <\/p>\n\n\n\n

Evolving Threats: The Rapid Rise of macOS Stealers<\/a>  <\/p>\n\n\n\n

Crypto-Stealing Code Lurking in Python Package Dependencies<\/a>  <\/p>\n\n\n\n

MDR in Action: Preventing The More_eggs Backdoor From Hatching<\/a>       <\/p>\n\n\n\n

Fake browser updates spread updated WarmCookie malware<\/a><\/p>\n\n\n\n

MASKDROID: Robust Android Malware Detection with Masked Graph Representations<\/a><\/p>\n\n\n\n

An In-depth Analysis of a Nation-Sponsored Attack: Case Study and Cybersecurity Insights<\/a> <\/p>\n\n\n\n

Model X-Ray: Detection of Hidden Malware in AI Model Weights using Few Shot Learning<\/a><\/p>\n\n\n\n

LEDA\u2014Layered Event-Based Malware Detection Architecture<\/a><\/p>\n\n\n\n

FIN7 hosting honeypot domains with malicious AI DeepNude Generators \u2013 New Silent Push research<\/a>      <\/p>\n\n\n\n

North Korean Hackers Using New VeilShell Backdoor in Stealthy Cyber Attacks<\/a><\/p>\n\n\n\n

perfctl: A Stealthy Malware Targeting Millions of Linux Servers<\/a> SHROUDED#SLEEP: A<\/a> **** Deep Dive into North Korea\u2019s Ongoing Campaign Against Southeast Asia<\/a>     <\/p>\n\n\n\n

Pig Butchering Alert: Fraudulent Trading App targeted iOS and Android users<\/a>  <\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/gwmw><\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a> \u2013<\/strong> hacking, malware)<\/strong><\/p>\n\n\n\n

<\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape. Rhadamanthys Stealer Adds Innovative AI Feature in Version 0.7.0 Threat Actors leverage Docker Swarm and Kubernetes to […]<\/p>\n","protected":false},"author":1,"featured_media":165407,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,3,183,4337,5,7,55],"tags":[88,4112,9508,9506,10918,30,687,841,1533],"class_list":["post-169427","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-cyber-crime","category-cyber-warfare-2","category-data-breach","category-hacking","category-malware","category-security","tag-cybercrime","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-malware-2","tag-pierluigi-paganini","tag-security-affairs","tag-security-news"],"yoast_head":"\n杭州江阴科强工业胶带有限公司