Today's Core Dump is brought to you by ThreatPerspective

Security Affairs

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 88

Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages Inside Coruna: Reverse Engineering a Nation-State iOS Exploit Kit From JavaScript  ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered via Bincrypter-Based Loader New A0Backdoor Linked to […] Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages Inside Coruna: Reverse Engineering a Nation-State iOS Exploit Kit From JavaScript  ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered via Bincrypter-Based Loader New A0Backdoor Linked to Teams Impersonation and Quick Assist Social Engineering VOID#GEIST: Stealthy MultiStage Python Loader with Embedded Runtime Deployment, Startup Persistence, and Fileless Early Bird APC Injection into explorer.exe   New ‘Zombie ZIP’ technique lets malware slip past security tools Silence of the hops: The KadNap botnet BeatBanker: A dual mode Android Trojan   BlackSanta EDR-Killer A Silent Threat Targeting Recruitment Workflows  TAXISPY RAT : Analysis of TaxiSpy RAT Russian Banking Focused Android Malware with Full Remote Control A Slopoly start to AI-enhanced ransomware attacks   Oblivion: The New $300 Android RAT That Beats Every Major Phone Manufacturer’s Security       APT36: A Nightmare of Vibeware Pixel Perfect: Sold Extension Injects Code Through Pixel   Sednit reloaded: Back in the trenches VENON: The First Brazilian Banker RAT in Rust   Internet malware propagation: Dynamics and control through SEIRV epidemic model with relapse and intervention Synergistic Directed Execution and LLM-Driven Analysis for Zero-Day AI-Generated Malware Detection Representation-Centric Approach for Android Malware Classification: Interpretability-Driven Feature Engineering on Function Call Graphs Systematic Evaluation of Machine Learning and Deep Learning Models for IoT Malware Detection Across Ransomware, Rootkit, Spyware, Trojan, Botnet, Worm, Virus, and Keylogger Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs hacking, newsletter)

Published: 2026-03-15T14:21:20











© Segmentation Fault . All rights reserved.

Privacy | Terms of Use | Contact Us