Darkatlas
Darkatlas
Infrastructure adversary hunting

Smishing Triad Targets Egypt’s Financial Sector and Postal Services

DarkAtlas
DarkAtlas
November 24, 2025

Recently, during one of our threat hunting operations, our squad identified multiple malicious...

Read More
Threat Intelligence

Threat Profile: APT35 (Charming Kitten)

DarkAtlas
DarkAtlas
October 17, 2025

Executive Summary APT35, also known as Magic Hound and Charming Kitten, is an Iranian state-backed...

Read More
Threat Intelligence

Suspicious ScreenConnect Abuse by Threat Actors

DarkAtlas
DarkAtlas
October 12, 2025

Recently observed an uptick in threat actors abusing RMM tools for initial access via...

Read More
Threat Intelligence

Threat Profile: Conti Ransomware Group

DarkAtlas
DarkAtlas
September 29, 2025

Executive Summary Conti ransomware, first identified in 2019, quickly became one of the most...

Read More
Threat Intelligence

MuddyWater: Inside Iran’s Persistent Cyber-Espionage Group Targeting the Middle East

DarkAtlas
DarkAtlas
August 24, 2025

MuddyWater, a long-running Iranian cyber-espionage group affiliated with Iran’s Ministry of...

Read More
Malware Analysis

Marketing’s Shadow Twin: Cybercrime’s Use of Legitimate Online Platforms

DarkAtlas
DarkAtlas
August 16, 2025

Introduction digital analytics tools—such as link shorteners, location trackers, CAPTCHAs, and...

Read More
Threat Intelligence

Scattered Spider – UNC3944: A Comprehensive and Detailed Threat Profile

DarkAtlas
DarkAtlas
August 11, 2025

Scattered Spider (also known by aliases such as 0ktapus, Muddled Libra, Roasted 0ktapus, Scatter...

Read More
Threat Intelligence

Qilin Ransomware: A Deep Dive into Operations & OPSEC Breakdowns

DarkAtlas
DarkAtlas
August 5, 2025

A Major Power Shift: The Sudden Disappearance of RansomHub One of the most pivotal developments in...

Read More
Threat Intelligence

Critical SharePoint Vulnerability CVE-2025-53770: Remote Code Execution via ViewState Abuse

DarkAtlas
DarkAtlas
July 20, 2025

On the evening of July 18, 2025, active and large-scale exploitation of a newly discovered...

Read More
Malware Analysis

How Shortcut Files (.LNK) used to Deliver Ransomware

DarkAtlas
DarkAtlas
July 17, 2025

Windows Shortcut files — commonly known as LNK files — are a core part of the Windows...

Read More
1 2 3 4

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025
  • April 2025
  • March 2025
  • November 2024
  • October 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • January 2024

Categories

  • Infrastructure adversary hunting
  • Malware Analysis
  • Threat Intelligence
  • Threat Profile