Critical SharePoint Vulnerability CVE-2025-53770: Remote Code Execution via ViewState Abuse
On the evening of July 18, 2025, active and large-scale exploitation of a newly discovered...
Read MoreHow Shortcut Files (.LNK) used to Deliver Ransomware
Windows Shortcut files — commonly known as LNK files — are a core part of the Windows...
Read MoreClickFix Chaos: A Deep Dive into Rhadamanthys Infostealer’s Stealth and Steal Tactics
While hunting for phishing domains, I came across this suspicious...
Read MoreMedusa Ransomware Group’s OPSEC Failure: Infiltrating Their Cloud Storage
Dark Atlas Squad recently responded to a ransomware incident carried out by Medusa Ransomware...
Read MoreKimsuky APT: The TrollAgent Stealer Analysis
The Kimsuky APT is a North Korea-based cyber espionage group that has been operating since at least...
Read MoreIn-Depth Technical Analysis of NoEscape Ransomware
What is NoEscape Ransomware? NoEscape ransomware emerged in May 2023 as a financially motivated...
Read MoreGhostLocker RaaS V2.0
GhostLocker, a potent Ransomware-as-a-Service, emerged from the GhostSec group, aligned with the...
Read Moreinvestigation-report-105k-user-data-breach-at-egyptian-e-commerce-website
On 13th April 2024, a threat actor named “BIGBlack” Posted a thread on a Darkweb forum titled...
Read MoreIn-Depth Technical Analysis of Nightingale Stealer
Around 15th December, a threat actor appeared on multiple forums advertising their stealer,...
Read MoreIn-Depth Technical Analysis of SEIDR Stealer
On December 28, a new info-stealer called SEIDR Information Stealer appeared on an underground...
Read More