Malware Blog News 2023 - 2024  2023  2022  2021  2020  2019  2018

APT blog  Attack blog  BigBrother blog  BotNet blog  Cyber blog  Cryptocurrency blog  Exploit blog  Hacking blog  ICS blog  Incident blog  IoT blog  Malware blog  OS Blog  Phishing blog  Ransom blog  Safety blog  Security blog  Social blog  Spam blog  Vulnerebility blog

DatumNázevBlogCompanies

30.12.23

From DarkGate to AsyncRAT: Malware Detected and Shared As Unit 42 Timely Threat IntelligenceMalware blogPalo Alto

25.12.23

Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your SecretsMalware blogPalo Alto

25.12.23

Intellexa and Cytrox: From fixer-upper to Intel Agency-grade spywareMalware blog

Cisco Blog

16.12.23

Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled DomainsMalware blogPalo Alto

10.12.23

The malware, attacker trends and more that shaped the threat landscape in 2023Malware blog

Cisco Blog

2.12.23

New SugarGh0st RAT targets Uzbekistan government and South Korea

Malware blog

Cisco Blog

18.11.23

MALWARE SPOTLIGHT – INTO THE TRASH: ANALYZING LITTERDRIFTERMalware blogCheckpoint

18.11.23

A deep dive into Phobos ransomware, recently deployed by 8Base groupMalware blog

Cisco Blog

18.11.23

Understanding the Phobos affiliate structure and activityMalware blog

Cisco Blog

15.11.23

GPT VS MALWARE ANALYSIS: CHALLENGES AND MITIGATIONSMalware blogCheckpoint

15.11.23

Spyware disguised as a news app – Week in security with Tony AnscombeMalware blog

Eset

4.11.23

Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla)

Malware blog

Palo Alto

4.11.23

CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys

Malware blog

Palo Alto

8.10.23Qakbot-affiliated actors distribute Ransom Knight malware despite infrastructure takedownMalware blogCisco Blog
8.10.23DinodasRAT used against governmental entity in Guayana – Week in security with Tony AnscombeMalware blogEset

24.9.23

Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian GovernmentMalware blogPalo Alto

24.9.23

Fake CVE-2023-40477 Proof of Concept Leads to VenomRATMalware blogPalo Alto

24.9.23

BEHIND THE SCENES OF BBTOK: ANALYZING A BANKER’S SERVER SIDE COMPONENTSMalware blogCheckpoint

24.9.23

UNVEILING THE SHADOWS: THE DARK ALLIANCE BETWEEN GULOADER AND REMCOSMalware blog

Checkpoint

24.9.23

New ShroudedSnooper actor targets telecommunications firms in the Middle East with novel ImplantsMalware blog

Cisco Blog

24.9.23

Stealth Falcon preying over Middle Eastern skies with DeadglyphMalware blog

Eset

24.9.23

OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipesMalware blog

Eset

16.9.23

RedLine Stealer: Answers to Unit Wireshark QuizMalware blogPalo Alto

16.9.23

Crossing the Line: Unit 42 Wireshark Quiz for RedLine StealerMalware blogPalo Alto

16.9.23

GUARDING AGAINST THE UNSEEN: INVESTIGATING A STEALTHY REMCOS MALWARE ATTACK ON COLOMBIAN FIRMSMalware blogCheckpoint

16.9.23

New open-source infostealer, and reflections on 2023 so farMalware blog

Cisco Blog

16.9.23

SapphireStealer: Open-source information stealer enables credential and data theftMalware blog

Cisco Blog

16.9.23

Lazarus Group's infrastructure reuse leads to discovery of new malwareMalware blog

Cisco Blog

16.9.23

Lazarus Group exploits ManageEngine vulnerability to deploy QuiteRATMalware blog

Cisco Blog

16.9.23

Ballistic Bobcat's Sponsor backdoor – Week in security with Tony AnscombeMalware blog

Eset

16.9.23

Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoorMalware blog

Eset

29.08.2023Crossing the Line: Unit 42 Wireshark Quiz for RedLine StealerMalware blogPalo Alto
29.08.2023What is commercial spyware?Malware blogCisco Blog
28.08.2023A Bard’s Tale – how fake AI bots try to install malwareMalware blogEset
06.08.2023NodeStealer 2.0 – The Python Version: Stealing Facebook Business AccountsMalware blogPalo Alto
06.08.2023Why are there so many malware-as-a-service offerings?Malware blogCisco Blog
06.08.2023The grand theft of Jake Moore’s voice: The concept of a virtual kidnapMalware blogEset
06.08.2023Is backdoor access oppressive? – Week in security with Tony AnscombeMalware blogEset
06.08.2023Gathering dust and data: How robotic vacuums can spy on youMalware blogEset
05.08.2023Linux Threat Hunting: ‘Syslogk’ a kernel rootkit found under development in the wildMalware blogAvast blog
05.08.2023Reptile Malware Targeting Linux SystemsMalware blogASEC
21.07.2023P2PInfect: The Rusty Peer-to-Peer Self-Replicating WormMalware blogPalo Alto
21.07.2023BYOS – BUNDLE YOUR OWN STEALERMalware blogCheckpoint
21.07.2023Why are there so many malware-as-a-service offerings?Malware blogCisco Blog
21.07.2023Undocumented driver-based browser hijacker RedDriver targets Chinese speakers and internet cafesMalware blogCisco Blog
15.07.2023Six Malicious Python Packages in the PyPI Targeting Windows UsersMalware blogPalo Alto Unity42
15.07.2023BEYOND THE HORIZON: TRAVELING THE WORLD ON CAMARO DRAGON’S USB FLASH DRIVESMalware blogCheckpoint
15.07.2023STEALTH SOLDIER BACKDOOR USED IN TARGETED ESPIONAGE ATTACKS IN NORTH AFRICAMalware blogCheckpoint
15.07.2023RUST BINARY ANALYSIS, FEATURE BY FEATUREMalware blogCheckpoint
15.07.2023MALWARE SPOTLIGHT: CAMARO DRAGON’S TINYNOTE BACKDOORMalware blogCheckpoint
15.07.2023ESET Research Podcast: Finding the mythical BlackLotus bootkitMalware blogEset