Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape————————————————————————————————————————————-[Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet](https://www.trendmicro.com/en_us/research/25/f/langflow-vulnerability-flodric-botnet.html)[Predator Still Active, with New Client and Corporate Links Identified](https://www.recordedfuture.com/research/predator-still-active-new-links-identified)[Threat Group Targets Companies in Taiwan](https://www.fortinet.com/blog/threat-research/threat-group-targets-companies-in-taiwan)[Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion](https://www.huntress.com/blog/inside-bluenoroff-web3-intrusion-analysis)[Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper](https://www.trendmicro.com/en_us/research/25/f/anubis-a-closer-look-at-an-emerging-ransomware.html)[2025 Blockchain and Cryptocurrency Threat Report: Malware in the Open Source Supply Chain](https://socket.dev/blog/2025-blockchain-and-cryptocurrency-threat-report)[Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data](https://research.checkpoint.com/2025/minecraft-mod-malware-stargazers/)[Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation](https://unit42.paloaltonetworks.com/kimjongrat-stealer-variant-powershell/)[Threat actor Banana Squad exploits GitHub repos in new campaign](https://www.reversinglabs.com/blog/threat-actor-banana-squad-exploits-github-repos-in-new-campaign)[AntiDot Malware](https://catalyst.prodaft.com/public/report/antidot/overview#heading-1000)[Your Mobile App, Their Playground: The Dark side of the Virtualization](https://zimperium.com/blog/your-mobile-app-their-playground-the-dark-side-of-the-virtualization)[Semantic Preprocessing for LLM-based Malware Analysis](https://arxiv.org/pdf/2506.12113)[Empirical Quantification of Spurious Correlations in Malware Detection](https://arxiv.org/abs/2506.09662)[A Survey on Reinforcement Learning-Driven Adversarial Sample Generation for PE Malware](https://www.mdpi.com/2079-9292/14/12/2422)[Crypto-Ransomware Detection Through a Honeyfile-Based Approach with R-Locker](https://www.mdpi.com/2227-7390/13/12/1933)Follow me on Twitter: [@securityaffairs](https://twitter.com/securityaffairs) and [Facebook](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[Pierluigi Paganini](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)([SecurityAffairs](http://securityaffairs.co/wordpress/) — hacking, malware)
Related Tags:
NAICS: 54 – Professional
Scientific
Technical Services
NAICS: 334 – Computer And Electronic Product Manufacturing
NAICS: 541 – Professional
Scientific
Technical Services
NAICS: 518 – Computing Infrastructure Providers
Data Processing
Web Hosting
Related Services
NAICS: 33 – Manufacturing – Metal
Electronics And Other
NAICS: 51 – Information
Blog: Security Affairs
Associated Indicators:


