A Case-Control Study to Measure Behavioral Risks of Malware Encounters in Organizations
PyPI Python Library “aiocpa” Found Exfiltrating Crypto Keys via Telegram Bot
Bootkitty: Analyzing the first UEFI bootkit for Linux
Hudson Rock Announces First Comprehensive Infostealers AI Bot: CavalierGPT
Gaming Engines: An Undetected Playground for Malware Loaders
Dozens of Machines Infected: Year-Long NPM Supply Chain Attack Combines Crypto Mining and Data Theft
SpyLoan: A Global Threat Exploiting Social Engineering
XAI and Android Malware Models
Feasibility Study for Supporting Static Malware Analysis Using LLM
A Study of Malware Prevention in Linux Distributions
Chaotic-Based Shellcode Encryption: A New Strategy for Bypassing Antivirus Mechanisms
Survey of Transformer-Based Malicious Software Detection Systems
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
Russia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPY
How to target European SMEs with Ransomware? Through Zyxel!
Unveiling the Past and Present of APT-K-47 Weapon: Asyncshell
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, newsletter)