Linux security has taken its place among the most pressing security concerns in the industry, as explained in an article by UPI. Emotet evolves and Office documents continue to be infection vectors.
For more articles, check out our #onpatrol4malware blog.

New malware targets security to mine cryptocurrency undetected
Source: UPI
Researchers have uncovered a new type of malware that can remove security features on Linux cloud servers without detection. Read more.

Hosting malicious sites on legitimate servers: How do threat actors get away with it?
Source: Malwarebytes
Imposters can give your company an undeserved bad reputation and cause financial damages. Many financial companies are held responsible for losses due to phishing mails and fake copies of their websites. Read more.

Websites can steal browser data via extensions APIs
Source: ZDNet
Researcher finds nearly 200 Chrome, Firefox, and Opera extensions vulnerable to attacks from malicious sites. Read more.

DarkHydrus delivers new Trojan that can use Google Drive for C2 communications
Source: Palo Alto Networks
We collected a total of three DarkHydrus delivery documents installing a new variant of the RogueRobin trojan. Read more.

Emotet re-emerges after the holidays
Source: Talos
These new malicious efforts involve sending victims malicious Microsoft Word attachments with embedded macros that download Emotet. Read more.