io_uring Is Back, This Time as a Rootkit
I StealC You: Tracking the Rapid Changes To StealC
Interesting WordPress Malware Disguised as Legitimate Anti-Malware Plugin
Using Trusted Protocols Against You: Gmail as a C2 Mechanism
Interesting WordPress Malware Disguised as Legitimate Anti-Malware Plugin
The Rapid Evolution of CLEARFAKE Delivery
Uncovering MintsLoader With Recorded Future Malware Intelligence Hunting
wget to Wipeout: Malicious Go Modules Fetch Destructive Payload
Dual Explanations via Subgraph Matching for Malware Detection
Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors
Inside the Latest Espionage Campaign of Nebulous Mantis
DarkWatchman cybercrime malware returns on Russian networks
MAL-XSEL: Enhancing Industrial Web Malware Detection with an Explainable Stacking Ensemble ModelUsing Trusted Protocols Against You: Gmail as a C2 Mechanism
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, newsletter)