Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.————————————————————————————————————————————–**Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape.**[New Campaign Uses Remcos RAT to Exploit Victims](https://www.fortinet.com/blog/threat-research/new-campaign-uses-remcos-rat-to-exploit-victims)[Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign](https://news.sophos.com/en-us/2024/11/06/bengal-cat-lovers-in-australia-get-psspsspssd-in-google-driven-gootloader-campaign/)[Ymir: new stealthy ransomware in the wild](https://securelist.com/new-ymir-ransomware-found-in-colombia/114493/)[ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again](https://www.bitdefender.com/en-gb/blog/businessinsights/shrinklocker-decryptor-from-friend-to-foe-and-back-again)[Stealthy Attributes of APT Lazarus: Evading Detection with Extended Attributes](https://www.group-ib.com/blog/stealthy-attributes-of-apt-lazarus/)[Glove Stealer: Leveraging IElevator to Bypass App-Bound Encryption -& Steal Sensitive Data](https://www.gendigital.com/blog/news/innovation/glove-stealer)[Botnet exploits GeoVision zero-day to install Mirai malware](https://www.bleepingcomputer.com/news/security/botnet-exploits-geovision-zero-day-to-install-mirai-malware/)[Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM](https://arxiv.org/abs/2411.05982)[Chaotic-Based Shellcode Encryption: A New Strategy for Bypassing Antivirus Mechanisms](https://www.mdpi.com/2073-8994/16/11/1526)[Malware Spotlight: A Deep-Dive Analysis of WezRat](https://research.checkpoint.com/2024/wezrat-malware-deep-dive/)[APT Actors Embed Malware within macOS Flutter Applications](https://www.jamf.com/blog/jamf-threat-labs-apt-actors-embed-malware-within-macos-flutter-applications/)[Hamas-affiliated Threat Actor WIRTE Continues its Middle East Operations and Moves to Disruptive Activity](https://research.checkpoint.com/2024/hamas-affiliated-threat-actor-expands-to-disruptive-activity/)[CVE-2024-43451: A New Zero-Day Vulnerability Exploited in the wild](https://www.clearskysec.com/0d-vulnerability-exploited-in-the_wild/)[New PXA Stealer targets government and education sectors for sensitive information](https://blog.talosintelligence.com/new-pxa-stealer/)Follow me on Twitter: [**@securityaffairs**](https://twitter.com/securityaffairs) and [**Facebook**](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[**Pierluigi Paganini**](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)**(** [**SecurityAffairs**](http://securityaffairs.co/wordpress/)**–** **hacking, [newsletter](https://securityaffairs.com/170041/breaking-news/security-affairs-newsletter-round-494-by-pierluigi-paganini-international-edition.html))**
Related Tags:
NAICS: 61 – Educational Services
NAICS: 611 – Educational Services
NAICS: 923 – Administration Of Human Resource Programs
NAICS: 519 – Web Search Portals
Libraries
Archives
Other Information Services
NAICS: 518 – Computing Infrastructure Providers
Data Processing
Web Hosting
Related Services
NAICS: 92 – Public Administration
NAICS: 922 – Justice
Public Order
Safety Activities
NAICS: 51 – Information
WIRTE
Associated Indicators: