Dissecting Lumma Malware: Analyzing the Fake CAPTCHA and Obfuscation Techniques – Part 2
Predator Spyware Infrastructure Returns Following Exposure and Sanctions
Malware’s Shared Secrets: Code Similarity Insights for Ransomware Gangs Activities Tracking
Mallox ransomware: in-depth analysis and evolution
A glimpse into the Quad7 operators’ next moves and associated botnets
CosmicBeetle steps up: Probation period at RansomHub
New RansomHub attack uses TDSKiller and LaZagne, disables EDR
Hadooken Malware Targets Weblogic Applications
Ajina attacks Central Asia: Story of an Uzbek Android Pandemic
Void captures over a million Android TV boxes
Applications of Fuzzy Logic and Probabilistic Neural Networks in E-Service for Malware Detection
A new TrickMo saga: from Banking Trojan to Victim’s Data Leak
Earth Preta Evolves its Attacks with New Malware and Strategies
Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401
TIDRONE Targets Military and Satellite Industries in Taiwan
Fake recruiter coding tests target devs with malicious Python packages Targeted Iranian Attacks Against Iraqi Government Infrastructure
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, newsletter)