Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape————————————————————————————————————————————-[PupkinStealer : A .NET-Based Info-Stealer](https://www.cyfirma.com/research/pupkinstealer-a-net-based-info-stealer/)[Interlock ransomware evolving under the radar](https://blog.sekoia.io/interlock-ransomware-evolving-under-the-radar/)[Technical Analysis of TransferLoader](https://www.zscaler.com/blogs/security-research/technical-analysis-transferloader)[Sophisticated NPM Attack Leveraging Unicode Steganography and Google Calendar C2](https://www.veracode.com/resources/sophisticated-npm-attack-leveraging-unicode-steganography-and-google-calendar-c2)[Horabot Unleashed: A Stealthy Phishing Threat](https://www.fortinet.com/blog/threat-research/horabot-unleashed-a-stealthy-phishing-threat)[High Risk Warning for Windows Ecosystem: New Botnet Family HTTPBot is Expanding](https://nsfocusglobal.com/high-risk-warning-for-windows-ecosystem-new-botnet-family-httpbot-is-expanding/)[Printer maker Procolored offered malware-laced drivers for months](https://www.bleepingcomputer.com/news/security/printer-maker-procolored-offered-malware-laced-drivers-for-months/)[Fileless Execution: PowerShell Based Shellcode Loader Executes Remcos RAT](https://blog.qualys.com/vulnerabilities-threat-research/2025/05/15/fileless-execution-powershell-based-shellcode-loader-executes-remcos-rat)[Skitnet](https://catalyst.prodaft.com/public/report/skitnet/overview#heading-1000)[TA406 Pivots to the Front](https://www.proofpoint.com/us/blog/threat-insight/ta406-pivots-front)[MAL-XSEL: Enhancing Industrial Web Malware Detection with an Explainable Stacking Ensemble Model](https://www.mdpi.com/2227-9717/13/5/1329)[FICConvNet: A Privacy-Preserving Framework for Malware Detection Using CKKS Homomorphic Encryption](https://www.mdpi.com/2079-9292/14/10/1982)[Scaling Up: Revisiting Mining Android Sandboxes at Scale for Malware Classification](https://arxiv.org/abs/2505.09501)[Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems](https://arxiv.org/abs/2505.09342)Follow me on Twitter: [**@securityaffairs**](https://twitter.com/securityaffairs) and [**Facebook**](https://www.facebook.com/sec.affairs) and [**Mastodon**](https://infosec.exchange/@securityaffairs)[**Pierluigi Paganini**](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)**(** [**SecurityAffairs**](http://securityaffairs.co/wordpress/)**–** **hacking, newsletter)**
Related Tags:
NAICS: 519 – Web Search Portals
Libraries
Archives
Other Information Services
NAICS: 333 – Machinery Manufacturing
NAICS: 33 – Manufacturing – Metal
Electronics And Other
NAICS: 51 – Information
Blog: Security Affairs
Remcos
Phishing
Associated Indicators:


