Crypto Money Laundering
Crypto Money Laundering: Definition, Stages, and Common Techniques Money laundering is the process...
Read MoreSmishing Triad Targets Egypt’s Financial Sector and Postal Services
Recently, during one of our threat hunting operations, our squad identified multiple malicious...
Read MoreMuddyWater: Inside Iran’s Persistent Cyber-Espionage Group Targeting the Middle East
MuddyWater, a long-running Iranian cyber-espionage group affiliated with Iran’s Ministry of...
Read MoreMarketing’s Shadow Twin: Cybercrime’s Use of Legitimate Online Platforms
Introduction digital analytics tools—such as link shorteners, location trackers, CAPTCHAs, and...
Read MoreQilin Ransomware: A Deep Dive into Operations & OPSEC Breakdowns
A Major Power Shift: The Sudden Disappearance of RansomHub One of the most pivotal developments in...
Read MoreCritical SharePoint Vulnerability CVE-2025-53770: Remote Code Execution via ViewState Abuse
On the evening of July 18, 2025, active and large-scale exploitation of a newly discovered...
Read MoreHow Shortcut Files (.LNK) used to Deliver Ransomware
Windows Shortcut files — commonly known as LNK files — are a core part of the Windows...
Read MoreClickFix Chaos: A Deep Dive into Rhadamanthys Infostealer’s Stealth and Steal Tactics
While hunting for phishing domains, I came across this suspicious...
Read MoreMedusa Ransomware Group’s OPSEC Failure: Infiltrating Their Cloud Storage
Dark Atlas Squad recently responded to a ransomware incident carried out by Medusa Ransomware...
Read MoreKimsuky APT: The TrollAgent Stealer Analysis
The Kimsuky APT is a North Korea-based cyber espionage group that has been operating since at least...
Read More