Security Affairs Malware newsletter includes a collection of the best articles and research on malware in the international landscapeThirty-Six Malicious npm Strapi Packages Deploy Redis RCE, Database Theft, and Persistent C2 Malicious LNK Files Distributing a Python-Based Backdoor and Changes in Distribution Techniques (Kimsuky Group) Hackers Are Attempting to Turn ComfyUI Servers Into a Cryptomining Proxy Botnet Pawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure Entities Hackers Are Attempting to Turn ComfyUI Servers Into a Cryptomining Proxy BotnetMasjesu Rising: The Commercial IoT Botnet Built for Stealth, DDoS, and IoT EvasionEXPMON detected sophisticated zero-day fingerprinting attack targeting Adobe Reader users New Lua-based malware “LucidRook” observed in targeted attacks against Taiwanese organizations Critical Supply Chain Compromise in Smart Slider 3 Pro: Full Malware Analysis GlassWorm goes native: New Zig dropper infects every IDE on your machine ClickFix malware hits DoD cybersecurity vendor homepage Beyond BITTER: MENA Civil Society Targeted in Hack-For-Hire Operation Linked to BITTER APT Can Drift-Adaptive Malware Detectors Be Made Robust? Attacks and Defenses Under White-Box and Black-Box ThreatsExplainability-Guided Adversarial Attacks on Transformer-Based Malware Detectors Using Control Flow GraphsMitigating Metamorphic Malware Through Adversarial Learning TechniquesAI-Amplification Indicator: An Actor-Level Scoring Framework for Ransomware Operations on the Dark WebAutomating the Detection of Evasive Windows Malware: An Evaluated YARA Rule Library for Anti-VM and Anti-Sandbox TechniquesFollow me on Twitter: @securityaffairs and Facebook and MastodonPierluigi Paganini(SecurityAffairs – hacking, newsletter)