Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscape————————————————————————————————————————————-Malware Newsletter[SesameOp: Novel backdoor uses OpenAI Assistants API for command and control](https://www.microsoft.com/en-us/security/blog/2025/11/03/sesameop-novel-backdoor-uses-openai-assistants-api-for-command-and-control/)[Weaponized Military Documents Deliver Advanced SSH-Tor Backdoor to Defense Sector](https://cyble.com/blog/weaponized-military-documents-deliver-backdoor/)[Gootloader Returns: What Goodies Did They Bring?](https://www.huntress.com/blog/gootloader-threat-detection-woff2-obfuscation)[Ransomvibing appears in VS Code extensions](https://secureannex.com/blog/ransomvibe/)[Vibe-Coded Malicious VS Code Extension Found with Built-In Ransomware Capabilities](https://thehackernews.com/2025/11/vibe-coded-malicious-vs-code-extension.html)[Investigation Report: Android/BankBot-YNRK Mobile Banking Trojan](https://www.cyfirma.com/research/investigation-report-android-bankbot-ynrk-mobile-banking-trojan/)[LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices](https://unit42.paloaltonetworks.com/landfall-is-new-commercial-grade-android-spyware/)[Hidden Logic Bombs in Malware-Laced NuGet Packages Set to Detonate Years After Installation](https://thehackernews.com/2025/11/hidden-logic-bombs-in-malware-laced.html)[DPRK’s Playbook: Kimsuky’s HttpTroy and Lazarus’s New BLINDINGCAN Variant](https://www.gendigital.com/blog/insights/research/dprk-kimsuky-lazarus-analysis)[Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines](https://businessinsights.bitdefender.com/curly-comrades-evasion-persistence-hidden-hyper-v-virtual-machines)[Adversarially Robust and Interpretable Magecart Malware Detection](https://arxiv.org/abs/2511.04440)[Android Malware Detection: A Machine Leaning Approach](https://arxiv.org/abs/2511.00894)[Legacy Code, Live Risk: Empirical Evidence of Malware Detection Gaps](https://www.mdpi.com/2076-3417/15/22/11862)[MemCatcher: An In-Depth Analysis Approach to Detect In-Memory Malware](https://www.mdpi.com/2076-3417/15/21/11800)Follow me on Twitter: [@securityaffairs](https://twitter.com/securityaffairs) and [Facebook](https://www.facebook.com/sec.affairs) and [Mastodon](https://infosec.exchange/@securityaffairs)[Pierluigi Paganini](http://www.linkedin.com/pub/pierluigi-paganini/b/742/559)([SecurityAffairs](http://securityaffairs.co/wordpress/) — hacking, [newsletter](https://securityaffairs.com/183862/security/security-affairs-malware-newsletter-round-68.html))
Related Tags:
NAICS: 54 – Professional
Scientific
Technical Services
NAICS: 927 – Space Research And Technology
NAICS: 334 – Computer And Electronic Product Manufacturing
NAICS: 541 – Professional
Scientific
Technical Services
NAICS: 518 – Computing Infrastructure Providers
Data Processing
Web Hosting
Related Services
NAICS: 92 – Public Administration
NAICS: 33 – Manufacturing – Metal
Electronics And Other
NAICS: 51 – Information
BLINDINGCAN
Associated Indicators:


