Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages Inside Coruna: Reverse Engineering a Nation-State iOS Exploit Kit From JavaScript ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered via Bincrypter-Based Loader New A0Backdoor Linked to […] Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape Malware Newsletter New BoryptGrab Stealer Targets Windows Users via Deceptive GitHub Pages Inside Coruna: Reverse Engineering a Nation-State iOS Exploit Kit From JavaScript ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered via Bincrypter-Based Loader New A0Backdoor Linked to Teams Impersonation and Quick Assist Social Engineering VOID#GEIST: Stealthy MultiStage Python Loader with Embedded Runtime Deployment, Startup Persistence, and Fileless Early Bird APC Injection into explorer.exe New ‘Zombie ZIP’ technique lets malware slip past security tools Silence of the hops: The KadNap botnet BeatBanker: A dual mode Android Trojan BlackSanta EDR-Killer A Silent Threat Targeting Recruitment Workflows TAXISPY RAT : Analysis of TaxiSpy RAT Russian Banking Focused Android Malware with Full Remote Control A Slopoly start to AI-enhanced ransomware attacks Oblivion: The New $300 Android RAT That Beats Every Major Phone Manufacturer’s Security APT36: A Nightmare of Vibeware Pixel Perfect: Sold Extension Injects Code Through Pixel Sednit reloaded: Back in the trenches VENON: The First Brazilian Banker RAT in Rust Internet malware propagation: Dynamics and control through SEIRV epidemic model with relapse and intervention Synergistic Directed Execution and LLM-Driven Analysis for Zero-Day AI-Generated Malware Detection Representation-Centric Approach for Android Malware Classification: Interpretability-Driven Feature Engineering on Function Call Graphs Systematic Evaluation of Machine Learning and Deep Learning Models for IoT Malware Detection Across Ransomware, Rootkit, Spyware, Trojan, Botnet, Worm, Virus, and Keylogger Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs hacking, newsletter)
Published: 2026-03-15T14:21:20