Malware Blog 2023- 2026  2025  2024  2023  2022  2021  2020  2019  2018

APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog

Datum Název Blog Companies

30.12.23

From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat Intelligence Malware blog Palo Alto

25.12.23

Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets Malware blog Palo Alto

25.12.23

Intellexa and Cytrox: From fixer-upper to Intel Agency-grade spyware Malware blog

Cisco Blog

16.12.23

Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains Malware blog Palo Alto

10.12.23

The malware, attacker trends and more that shaped the threat landscape in 2023 Malware blog

Cisco Blog

2.12.23

New SugarGh0st RAT targets Uzbekistan government and South Korea

Malware blog

Cisco Blog

18.11.23

MALWARE SPOTLIGHT – INTO THE TRASH: ANALYZING LITTERDRIFTER Malware blog Checkpoint

18.11.23

A deep dive into Phobos ransomware, recently deployed by 8Base group Malware blog

Cisco Blog

18.11.23

Understanding the Phobos affiliate structure and activity Malware blog

Cisco Blog

15.11.23

GPT VS MALWARE ANALYSIS: CHALLENGES AND MITIGATIONS Malware blog Checkpoint

15.11.23

Spyware disguised as a news app – Week in security with Tony Anscombe Malware blog

Eset

4.11.23

Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla)

Malware blog

Palo Alto

4.11.23

CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys

Malware blog

Palo Alto

8.10.23 Qakbot-affiliated actors distribute Ransom Knight malware despite infrastructure takedown Malware blog Cisco Blog
8.10.23 DinodasRAT used against governmental entity in Guayana – Week in security with Tony Anscombe Malware blog Eset

24.9.23

Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government Malware blog Palo Alto

24.9.23

Fake CVE-2023-40477 Proof of Concept Leads to VenomRAT Malware blog Palo Alto

24.9.23

BEHIND THE SCENES OF BBTOK: ANALYZING A BANKER’S SERVER SIDE COMPONENTS Malware blog Checkpoint

24.9.23

UNVEILING THE SHADOWS: THE DARK ALLIANCE BETWEEN GULOADER AND REMCOS Malware blog

Checkpoint

24.9.23

New ShroudedSnooper actor targets telecommunications firms in the Middle East with novel Implants Malware blog

Cisco Blog

24.9.23

Stealth Falcon preying over Middle Eastern skies with Deadglyph Malware blog

Eset

24.9.23

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes Malware blog

Eset

16.9.23

RedLine Stealer: Answers to Unit Wireshark Quiz Malware blog Palo Alto

16.9.23

Crossing the Line: Unit 42 Wireshark Quiz for RedLine Stealer Malware blog Palo Alto

16.9.23

GUARDING AGAINST THE UNSEEN: INVESTIGATING A STEALTHY REMCOS MALWARE ATTACK ON COLOMBIAN FIRMS Malware blog Checkpoint

16.9.23

New open-source infostealer, and reflections on 2023 so far Malware blog

Cisco Blog

16.9.23

SapphireStealer: Open-source information stealer enables credential and data theft Malware blog

Cisco Blog

16.9.23

Lazarus Group's infrastructure reuse leads to discovery of new malware Malware blog

Cisco Blog

16.9.23

Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRAT Malware blog

Cisco Blog

16.9.23

Ballistic Bobcat's Sponsor backdoor – Week in security with Tony Anscombe Malware blog

Eset

16.9.23

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor Malware blog

Eset

29.08.2023 Crossing the Line: Unit 42 Wireshark Quiz for RedLine Stealer Malware blog Palo Alto
29.08.2023 What is commercial spyware? Malware blog Cisco Blog
28.08.2023 A Bard’s Tale – how fake AI bots try to install malware Malware blog Eset
06.08.2023 NodeStealer 2.0 – The Python Version: Stealing Facebook Business Accounts Malware blog Palo Alto
06.08.2023 Why are there so many malware-as-a-service offerings? Malware blog Cisco Blog
06.08.2023 The grand theft of Jake Moore’s voice: The concept of a virtual kidnap Malware blog Eset
06.08.2023 Is backdoor access oppressive? – Week in security with Tony Anscombe Malware blog Eset
06.08.2023 Gathering dust and data: How robotic vacuums can spy on you Malware blog Eset
05.08.2023 Linux Threat Hunting: ‘Syslogk’ a kernel rootkit found under development in the wild Malware blog Avast blog
05.08.2023 Reptile Malware Targeting Linux Systems Malware blog ASEC
21.07.2023 P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm Malware blog Palo Alto
21.07.2023 BYOS – BUNDLE YOUR OWN STEALER Malware blog Checkpoint
21.07.2023 Why are there so many malware-as-a-service offerings? Malware blog Cisco Blog
21.07.2023 Undocumented driver-based browser hijacker RedDriver targets Chinese speakers and internet cafes Malware blog Cisco Blog
15.07.2023 Six Malicious Python Packages in the PyPI Targeting Windows Users Malware blog Palo Alto Unity42
15.07.2023 BEYOND THE HORIZON: TRAVELING THE WORLD ON CAMARO DRAGON’S USB FLASH DRIVES Malware blog Checkpoint
15.07.2023 STEALTH SOLDIER BACKDOOR USED IN TARGETED ESPIONAGE ATTACKS IN NORTH AFRICA Malware blog Checkpoint
15.07.2023 RUST BINARY ANALYSIS, FEATURE BY FEATURE Malware blog Checkpoint
15.07.2023 MALWARE SPOTLIGHT: CAMARO DRAGON’S TINYNOTE BACKDOOR Malware blog Checkpoint
15.07.2023 ESET Research Podcast: Finding the mythical BlackLotus bootkit Malware blog Eset