Malware authors have always looked for new techniques to stay invisible. This includes being invisible on the compromised machine, but it is even more important to hide malicious indicators and behavior during analysis.
During a penetration test, you could lucky enough to find a RCE vulnerability: in this case, the next step should be to obtain an interactive shell.
Cisco released security updates to address a critical security vulnerability in Cisco ASA software.
Hyperion is a crypter for PE files, developed and presented by Christian Amman in 2012.
Recently a colleague asked me an example of how a malware can be spread using simple html pages hosted on a hacked website.
Microcode is an abstraction layer on top of the physical components of a CPU and is present in most CPUs.