#ransomware search results

Compromised update server or MitM? Kingdee's software updater is delivering .sorry ransomware. Payload hash: 42a1aded85892a80c83f741a7ac00e7e75015166c3be0bae29d93d3a4714711d #Ransom #Ransomware

anylink20240604's tweet image. Compromised update server or MitM?
Kingdee's software updater is delivering .sorry ransomware.
Payload hash: 42a1aded85892a80c83f741a7ac00e7e75015166c3be0bae29d93d3a4714711d
#Ransom #Ransomware
anylink20240604's tweet image. Compromised update server or MitM?
Kingdee's software updater is delivering .sorry ransomware.
Payload hash: 42a1aded85892a80c83f741a7ac00e7e75015166c3be0bae29d93d3a4714711d
#Ransom #Ransomware
anylink20240604's tweet image. Compromised update server or MitM?
Kingdee's software updater is delivering .sorry ransomware.
Payload hash: 42a1aded85892a80c83f741a7ac00e7e75015166c3be0bae29d93d3a4714711d
#Ransom #Ransomware
anylink20240604's tweet image. Compromised update server or MitM?
Kingdee's software updater is delivering .sorry ransomware.
Payload hash: 42a1aded85892a80c83f741a7ac00e7e75015166c3be0bae29d93d3a4714711d
#Ransom #Ransomware

Scripts and heroics aren’t a recovery plan. After an outage, most teams still rebuild by hand: slow, exhausting, and hard to prove clean. Recovery needs speed and certainty. 👉 bit.ly/4sOy6aD #CyberSecurity #Ransomware #EndpointManagement #Resilience

meetaidentech's tweet image. Scripts and heroics aren’t a recovery plan.

After an outage, most teams still rebuild by hand: slow, exhausting, and hard to prove clean.

Recovery needs speed and certainty.

👉 bit.ly/4sOy6aD

#CyberSecurity #Ransomware #EndpointManagement #Resilience

Ransomware doesn’t start when files are locked. That’s just when you notice. It starts earlier. MFA Patching Detection Backups 👇 hubs.ly/Q04bdnfR0 #CyberSecurity #Ransomware


Most #ransomware stories are attackers vs. defenders. This one wasn’t. 0APT and KryBit turned on each other — leaking infrastructure, affiliates, and negotiation data. What we found: • 0APT was fiction — 190+ “victims” were fabricated. Now fully disrupted. • KryBit is real —

halcyon.ai

0APT vs. KryBit Ransomware Actors List Opposing Operators as Victims

Aalysis of leaked operational data from 0APT and KryBit reveals fabricated victim claims, exposed affiliate infrastructure, and active indicators of compromise from the April 2026 clash between rival...


🚨 Ransomware Alert 🏢 massdevelopment.com 💀 Listed by DragonFiles on dark-web leak site 📊 1.59 TB · countdown 🔗 threatcluster.io/dark-web/under… #Ransomware #Dragonfiles #DarkWeb #ThreatIntel

threatcluster's tweet image. 🚨 Ransomware Alert

🏢 massdevelopment.com
💀 Listed by DragonFiles on dark-web leak site
📊 1.59 TB · countdown

🔗 threatcluster.io/dark-web/under…
#Ransomware #Dragonfiles #DarkWeb #ThreatIntel

VECT 2.0 permanently destroys files over 131KB. No decryption key. No recovery. This isn't ransomware — it's a wiper wearing a ransom note costume. #Ransomware #Malware #CyberSecurity thehackernews.com/2026/04/vect-2…

nullsy_exe's tweet image. VECT 2.0 permanently destroys files over 131KB. No decryption key. No recovery. This isn't ransomware — it's a wiper wearing a ransom note costume. #Ransomware #Malware #CyberSecurity thehackernews.com/2026/04/vect-2…

O #RansomWare chegando sorrateiramente quando ouviu vc dizer "amanhã eu faço o #BACKUP" Converse com quem está #Desde1982 construindo #Servidores no Brasil e insistindo que #BKP é fundamental! Sinco.net/ZAP


Ransomware is not just a data problem. The real cost is operational: stopped plants, delayed shipments, unavailable backups and executives asking when the business can run again. In 2026, resilience starts before the incident. #Cybersecurity #Ransomware #Resilience

cyber_pressure's tweet image. Ransomware is not just a data problem.

The real cost is operational: stopped plants, delayed shipments, unavailable backups and executives asking when the business can run again.

In 2026, resilience starts before the incident.

#Cybersecurity #Ransomware #Resilience

🚨 Ransomware Alert 🏢 wmsopko.com 💀 Listed by DragonFiles on dark-web leak site 📊 31 GB · countdown 🔗 threatcluster.io/dark-web/under… #Ransomware #Dragonfiles #DarkWeb #ThreatIntel

threatcluster's tweet image. 🚨 Ransomware Alert

🏢 wmsopko.com
💀 Listed by DragonFiles on dark-web leak site
📊 31 GB · countdown

🔗 threatcluster.io/dark-web/under…
#Ransomware #Dragonfiles #DarkWeb #ThreatIntel

🚨 BREAKING: #BreakingNews VECT 2.0 ransomware irreversibly destroys files over 131KB on Windows, Linux, ESXi—acts like a wiper due to encryption flaw, recovery impossible even for attackers. Victims hit in Brazil, South Africa. #Ransomware #Cybersecurity #Vect


One cyberattack can shut your business down overnight. 💼 Ransomware. Phishing. Financial Fraud. Are you protected? 👉 tinyurl.com/ITHLG0430 #CyberSecurity #ITHorizons #Ransomware


#Udemy data breach confirmed. After refusing to pay the ransom, hackers released data of 1.4M users, including personal and financial details. We @DarkEntryAms launched a lookup tool so you can check if you’re affected: darkentry.net/latest-breache… #DataBreach #Ransomware

Zigoo0's tweet image. #Udemy data breach confirmed.

After refusing to pay the ransom, hackers released data of 1.4M users, including personal and financial details.

We @DarkEntryAms launched a lookup tool so you can check if you’re affected:

darkentry.net/latest-breache…

#DataBreach #Ransomware
Zigoo0's tweet image. #Udemy data breach confirmed.

After refusing to pay the ransom, hackers released data of 1.4M users, including personal and financial details.

We @DarkEntryAms launched a lookup tool so you can check if you’re affected:

darkentry.net/latest-breache…

#DataBreach #Ransomware
Zigoo0's tweet image. #Udemy data breach confirmed.

After refusing to pay the ransom, hackers released data of 1.4M users, including personal and financial details.

We @DarkEntryAms launched a lookup tool so you can check if you’re affected:

darkentry.net/latest-breache…

#DataBreach #Ransomware

🚨 Ransomware Alert 🇺🇸 🏢 DaintyCloud Inc 💀 Listed by Shisa Ransomware Blog on dark-web leak site 📊 tech 🔗 threatcluster.io/dark-web/under… #Ransomware #ShisaRansomwareBlog #DarkWeb #ThreatIntel

threatcluster's tweet image. 🚨 Ransomware Alert 🇺🇸

🏢 DaintyCloud Inc
💀 Listed by Shisa Ransomware Blog on dark-web leak site
📊 tech

🔗 threatcluster.io/dark-web/under…
#Ransomware #ShisaRansomwareBlog #DarkWeb #ThreatIntel

#ThreatActors are moving beyond #ransomware to wipe data at scale. Abused admin channels make detection harder and response windows shorter. Read all about the shift to irreversible destruction and how to detect and defend against it. #DataWipeOut Read: cpx.net/insights/techn…

cpxholding's tweet image. #ThreatActors are moving beyond #ransomware to wipe data at scale.
Abused admin channels make detection harder and response windows shorter.
Read all about the shift to irreversible destruction and how to detect and defend against it. #DataWipeOut Read: cpx.net/insights/techn…

🚨 Ransomware Alert 🏢 aotco.com 💀 Listed by DragonFiles on dark-web leak site 📊 233 GB · countdown 🔗 threatcluster.io/dark-web/under… #Ransomware #Dragonfiles #DarkWeb #ThreatIntel

threatcluster's tweet image. 🚨 Ransomware Alert

🏢 aotco.com
💀 Listed by DragonFiles on dark-web leak site
📊 233 GB · countdown

🔗 threatcluster.io/dark-web/under…
#Ransomware #Dragonfiles #DarkWeb #ThreatIntel

Ransomware is now a business risk, not just an IT issue. Smart leaders prepare before attacks happen. linkedin.com/pulse/true-cos… #Ransomware #CyberSecurity #BusinessRisk #CyberResilience #CyberZen #Charlotte

cyberzeninc's tweet image. Ransomware is now a business risk, not just an IT issue. Smart leaders prepare before attacks happen.

linkedin.com/pulse/true-cos…

#Ransomware #CyberSecurity #BusinessRisk #CyberResilience #CyberZen #Charlotte

Ransomware doesn’t start when files are locked. That’s just when you notice. It starts earlier. MFA Patching Detection Backups 👇 hubs.ly/Q04bdnfR0 #CyberSecurity #Ransomware


Scripts and heroics aren’t a recovery plan. After an outage, most teams still rebuild by hand: slow, exhausting, and hard to prove clean. Recovery needs speed and certainty. 👉 bit.ly/4sOy6aD #CyberSecurity #Ransomware #EndpointManagement #Resilience

meetaidentech's tweet image. Scripts and heroics aren’t a recovery plan.

After an outage, most teams still rebuild by hand: slow, exhausting, and hard to prove clean.

Recovery needs speed and certainty.

👉 bit.ly/4sOy6aD

#CyberSecurity #Ransomware #EndpointManagement #Resilience

VECT 2.0 permanently destroys files over 131KB. No decryption key. No recovery. This isn't ransomware — it's a wiper wearing a ransom note costume. #Ransomware #Malware #CyberSecurity thehackernews.com/2026/04/vect-2…

nullsy_exe's tweet image. VECT 2.0 permanently destroys files over 131KB. No decryption key. No recovery. This isn't ransomware — it's a wiper wearing a ransom note costume. #Ransomware #Malware #CyberSecurity thehackernews.com/2026/04/vect-2…

Ransomware is not just a data problem. The real cost is operational: stopped plants, delayed shipments, unavailable backups and executives asking when the business can run again. In 2026, resilience starts before the incident. #Cybersecurity #Ransomware #Resilience

cyber_pressure's tweet image. Ransomware is not just a data problem.

The real cost is operational: stopped plants, delayed shipments, unavailable backups and executives asking when the business can run again.

In 2026, resilience starts before the incident.

#Cybersecurity #Ransomware #Resilience

Eso sería cuando la industria de la ciberdelincuencia no miraba en todos los rincones para poder entrar a un sistema. #APTs #Ransomware #Malware

REGLA NÚMERO 1 DE LA INFORMÁTICA. "Si funciona, NO LO TOQUES"



🏴‍☠️ Silentransomgroup has just published a new victim : Floyd Skeren Manukian Langevin, LLP ----------------- ransomware.live/id/RmxveWQgU2t… #ransomware


Most #ransomware stories are attackers vs. defenders. This one wasn’t. 0APT and KryBit turned on each other — leaking infrastructure, affiliates, and negotiation data. What we found: • 0APT was fiction — 190+ “victims” were fabricated. Now fully disrupted. • KryBit is real —

halcyon.ai

0APT vs. KryBit Ransomware Actors List Opposing Operators as Victims

Aalysis of leaked operational data from 0APT and KryBit reveals fabricated victim claims, exposed affiliate infrastructure, and active indicators of compromise from the April 2026 clash between rival...


Compromised update server or MitM? Kingdee's software updater is delivering .sorry ransomware. Payload hash: 42a1aded85892a80c83f741a7ac00e7e75015166c3be0bae29d93d3a4714711d #Ransom #Ransomware

anylink20240604's tweet image. Compromised update server or MitM?
Kingdee's software updater is delivering .sorry ransomware.
Payload hash: 42a1aded85892a80c83f741a7ac00e7e75015166c3be0bae29d93d3a4714711d
#Ransom #Ransomware
anylink20240604's tweet image. Compromised update server or MitM?
Kingdee's software updater is delivering .sorry ransomware.
Payload hash: 42a1aded85892a80c83f741a7ac00e7e75015166c3be0bae29d93d3a4714711d
#Ransom #Ransomware
anylink20240604's tweet image. Compromised update server or MitM?
Kingdee's software updater is delivering .sorry ransomware.
Payload hash: 42a1aded85892a80c83f741a7ac00e7e75015166c3be0bae29d93d3a4714711d
#Ransom #Ransomware
anylink20240604's tweet image. Compromised update server or MitM?
Kingdee's software updater is delivering .sorry ransomware.
Payload hash: 42a1aded85892a80c83f741a7ac00e7e75015166c3be0bae29d93d3a4714711d
#Ransom #Ransomware

Trigona #ransomware ups its game with custom exfiltration tool, boosting stealth and speed as attackers move beyond off-the-shelf tools to evade detection, @symantec reported. #cybersecurity #CISO #infosec bit.ly/4mYTaKf


Ransomware: el riesgo que ya no compromete solo sistemas, sino la continuidad misma del negocio | Por Fabián Descalzo cxo-community.com/2026/04/ransom… 🔗 CXOCommunity #Ransomware #Ciberseguridad

cxocommunity's tweet image. Ransomware: el riesgo que ya no compromete solo sistemas, sino la continuidad misma del negocio | Por Fabián Descalzo cxo-community.com/2026/04/ransom… 🔗 CXOCommunity #Ransomware #Ciberseguridad

One cyberattack can shut your business down overnight. 💼 Ransomware. Phishing. Financial Fraud. Are you protected? 👉 tinyurl.com/ITHLG0430 #CyberSecurity #ITHorizons #Ransomware


I'm a man-in-the-middle attack. Your DNS wasn't secured, so I just... sat down. Nobody noticed. #CyberThreats #Ransomware Your DNS deserves better.

DNSai_app's tweet image. I'm a man-in-the-middle attack. Your DNS wasn't secured, so I just... sat down. Nobody noticed. #CyberThreats #Ransomware Your DNS deserves better.

NEW THREAT INTEL: VECT Ransomware 2.0 - Russian RaaS with ChaCha20 bug acting as wiper on Windows/Linux/ESXi. 9 detections, 27 IOCs. intel.threadlinqs.com/#TL-2026-0432 #ThreatIntel #CyberSecurity #Ransomware #RaaS

threadlinqs's tweet image. NEW THREAT INTEL: VECT Ransomware 2.0 - Russian RaaS with ChaCha20 bug acting as wiper on Windows/Linux/ESXi. 9 detections, 27 IOCs. intel.threadlinqs.com/#TL-2026-0432 #ThreatIntel #CyberSecurity #Ransomware #RaaS

O #RansomWare chegando sorrateiramente quando ouviu vc dizer "amanhã eu faço o #BACKUP" Converse com quem está #Desde1982 construindo #Servidores no Brasil e insistindo que #BKP é fundamental! Sinco.net/ZAP


🚨 Ransomware Alert 🇺🇸 🏢 DaintyCloud Inc 💀 Listed by Shisa Ransomware Blog on dark-web leak site 📊 tech 🔗 threatcluster.io/dark-web/under… #Ransomware #ShisaRansomwareBlog #DarkWeb #ThreatIntel

threatcluster's tweet image. 🚨 Ransomware Alert 🇺🇸

🏢 DaintyCloud Inc
💀 Listed by Shisa Ransomware Blog on dark-web leak site
📊 tech

🔗 threatcluster.io/dark-web/under…
#Ransomware #ShisaRansomwareBlog #DarkWeb #ThreatIntel

🚨 BREAKING: #BreakingNews VECT 2.0 ransomware irreversibly destroys files over 131KB on Windows, Linux, ESXi—acts like a wiper due to encryption flaw, recovery impossible even for attackers. Victims hit in Brazil, South Africa. #Ransomware #Cybersecurity #Vect


Actor : krybit Victim : moser-spiel.at Date : 2026-04-28 13:21:27 UTC +3 According to #DarkWeb #Ransomware activity detected by the ThreatMon Threat Intelligence Team. The “#krybit” Ransomware group has added to its victims.


Actor : incransom Victim : durable-tech.com Date : 2026-04-28 09:41:17 UTC +3 According to #DarkWeb #Ransomware activity detected by the ThreatMon Threat Intelligence Team. The “#incransom” Ransomware group has added to its victims.


#Udemy data breach confirmed. After refusing to pay the ransom, hackers released data of 1.4M users, including personal and financial details. We @DarkEntryAms launched a lookup tool so you can check if you’re affected: darkentry.net/latest-breache… #DataBreach #Ransomware

Zigoo0's tweet image. #Udemy data breach confirmed.

After refusing to pay the ransom, hackers released data of 1.4M users, including personal and financial details.

We @DarkEntryAms launched a lookup tool so you can check if you’re affected:

darkentry.net/latest-breache…

#DataBreach #Ransomware
Zigoo0's tweet image. #Udemy data breach confirmed.

After refusing to pay the ransom, hackers released data of 1.4M users, including personal and financial details.

We @DarkEntryAms launched a lookup tool so you can check if you’re affected:

darkentry.net/latest-breache…

#DataBreach #Ransomware
Zigoo0's tweet image. #Udemy data breach confirmed.

After refusing to pay the ransom, hackers released data of 1.4M users, including personal and financial details.

We @DarkEntryAms launched a lookup tool so you can check if you’re affected:

darkentry.net/latest-breache…

#DataBreach #Ransomware

JAMESWT_WT's tweet image. Some #Interlock #ransomware gang Related Samples
👇
bazaar.abuse.ch/browse/tag/172…

Extra👇
bazaar.abuse.ch/browse/tag/Nod…
JAMESWT_WT's tweet image. Some #Interlock #ransomware gang Related Samples
👇
bazaar.abuse.ch/browse/tag/172…

Extra👇
bazaar.abuse.ch/browse/tag/Nod…

#ESETresearch detected a recent intrusion at a 🇵🇱University of Warsaw consistent with #Interlock ransomware gang. Thanks to early warning from our experts and the university's swift cooperation, the attack was disrupted before encryptors could be deployed.



💰How can you save $106,000 in Negotiation? 😈#Akira #Ransomware demanded $150,000 initially & finally agreed for $44K! Negotiation went like this:- $150,000 -> $60,000 -> $55,000 -> $44,000 #security #infosec #CyberSecurity #DarkWeb #Hack #OSINT #DeepWeb #ThreatIntel #malware

RakeshKrish12's tweet image. 💰How can you save $106,000 in Negotiation?

😈#Akira #Ransomware demanded $150,000 initially & finally agreed for $44K!

Negotiation went like this:-
$150,000 -> $60,000 -> $55,000 -> $44,000

#security #infosec #CyberSecurity #DarkWeb #Hack #OSINT #DeepWeb #ThreatIntel #malware

🌐 Last Week's #CyberAttack & #Ransomware Insights and Statistics 🎯 ➡️ TOP TARGETED COUNTRIES: 🇺🇸 United States: 101 🇬🇧 United Kingdom: 9 🇮🇹 Italy: 9 🇫🇷 France: 8 🇩🇪 Germany: 8 ➡️ TOP TARGETED SECTORS: 🔹 BusinessServices: 25 🔹 Manufacturing: 25 🔹 HealthCare: 20 🔹

ido_cohen2's tweet image. 🌐 Last Week's #CyberAttack & #Ransomware Insights and Statistics 🎯

➡️ TOP TARGETED COUNTRIES:
🇺🇸 United States: 101
🇬🇧 United Kingdom: 9
🇮🇹 Italy: 9
🇫🇷 France: 8
🇩🇪 Germany: 8

➡️ TOP TARGETED SECTORS:
🔹 BusinessServices: 25
🔹 Manufacturing: 25
🔹 HealthCare: 20
🔹

🌐 Last Week's #CyberAttack & #Ransomware Insights and Statistics 🎯 ➡️ TOP TARGETED COUNTRIES: 🇺🇸 United States: 111 🇨🇦 Canada: 11 🇮🇹 Italy: 10 🇩🇪 Germany: 10 🇬🇧 United Kingdom: 9 ➡️ TOP TARGETED SECTORS: 🔹 BusinessServices: 29 🔹 Legal: 26 🔹 Technology: 16 🔹 HealthCare: 16

ido_cohen2's tweet image. 🌐 Last Week's #CyberAttack & #Ransomware Insights and Statistics 🎯

➡️ TOP TARGETED COUNTRIES:
🇺🇸 United States: 111
🇨🇦 Canada: 11
🇮🇹 Italy: 10
🇩🇪 Germany: 10
🇬🇧 United Kingdom: 9

➡️ TOP TARGETED SECTORS:
🔹 BusinessServices: 29
🔹 Legal: 26
🔹 Technology: 16
🔹 HealthCare: 16

LIUSHEN Ransomware 3c553b52c0e537a88cc3f0be1a9447a7 #LIUSHEN #Ransomware #IOC

suyog41's tweet image. LIUSHEN Ransomware

3c553b52c0e537a88cc3f0be1a9447a7

#LIUSHEN #Ransomware #IOC
suyog41's tweet image. LIUSHEN Ransomware

3c553b52c0e537a88cc3f0be1a9447a7

#LIUSHEN #Ransomware #IOC
suyog41's tweet image. LIUSHEN Ransomware

3c553b52c0e537a88cc3f0be1a9447a7

#LIUSHEN #Ransomware #IOC

Day 9: Ransomware deployment. The threat actor RDP’d from the beachhead to backup & file servers and dropped the Lynx payload “w.exe” using a compromised Domain Admin account. Full breakdown 👇 thedfirreport.com/2025/12/17/cat… #DFIR #Ransomware #ThreatHunting #BlueTeam #CyberSecurity

TheDFIRReport's tweet image. Day 9: Ransomware deployment.

The threat actor RDP’d from the beachhead to backup & file servers and dropped the Lynx payload “w.exe” using a compromised Domain Admin account.

Full breakdown 👇
thedfirreport.com/2025/12/17/cat…

#DFIR #Ransomware #ThreatHunting #BlueTeam #CyberSecurity

Trigona ransomware swaps Rclone for a custom tool that rotates connections to evade monitoring. Learn how uploader_client.exe powers their data theft. #Trigona #Ransomware #MalwareAnalysis #InfoSec #CyberSecurity #DataTheft #ThreatIntel #NetworkSecurity securityonline.info/trigona-ransom…

the_yellow_fall's tweet image. Trigona ransomware swaps Rclone for a custom tool that rotates connections to evade monitoring. Learn how uploader_client.exe powers their data theft.

#Trigona #Ransomware #MalwareAnalysis #InfoSec #CyberSecurity #DataTheft #ThreatIntel #NetworkSecurity
securityonline.info/trigona-ransom…

Hunt.io uncovers a Gentlemen ransomware toolkit on a bulletproof host. Learn how the z1.bat script destroys defenses and backups before encryption. #Ransomware #TheGentlemen #InfoSec #CyberSecurity #MalwareAnalysis #MITRE securityonline.info/the-gentlemen-…

the_yellow_fall's tweet image. Hunt.io uncovers a Gentlemen ransomware toolkit on a bulletproof host. Learn how the z1.bat script destroys defenses and backups before encryption.

#Ransomware #TheGentlemen #InfoSec #CyberSecurity #MalwareAnalysis #MITRE
securityonline.info/the-gentlemen-…

🛑 Qilin and Warlock #ransomware are disabling defenses before attacks using BYOVD techniques. Qilin uses a side-loaded DLL to kill 300+ EDR drivers via vulnerable kernel drivers. Warlock exploits SharePoint and uses similar drivers to bypass kernel-level security, often

TheHackersNews's tweet image. 🛑 Qilin and Warlock #ransomware are disabling defenses before attacks using BYOVD techniques.

Qilin uses a side-loaded DLL to kill 300+ EDR drivers via vulnerable kernel drivers. Warlock exploits SharePoint and uses similar drivers to bypass kernel-level security, often

Team Cymru unmasks Yurei ransomware, a "Stranger Things" themed operation built on open-source code. Learn how proactive telemetry mapped their toolkit. #Yurei #Ransomware #CyberSecurity #InfoSec #ThreatIntel #StrangerThings #GoLang securityonline.info/yurei-ransomwa…

the_yellow_fall's tweet image. Team Cymru unmasks Yurei ransomware, a "Stranger Things" themed operation built on open-source code. Learn how proactive telemetry mapped their toolkit.

#Yurei #Ransomware #CyberSecurity #InfoSec #ThreatIntel #StrangerThings #GoLang
securityonline.info/yurei-ransomwa…

🚨 BREAKING: FBI seizes primary infrastructure of #Handala, the #Ransomware group linked to Iran’s IRGC! Court-authorized warrant leads to the takedown of domains used for state-sponsored cyber operations and network intrusions. Major blow to Iranian proxy activities. 📉 Full

ido_cohen2's tweet image. 🚨 BREAKING: FBI seizes primary infrastructure of #Handala, the #Ransomware group linked to Iran’s IRGC!

Court-authorized warrant leads to the takedown of domains used for state-sponsored cyber operations and network intrusions. Major blow to Iranian proxy activities. 📉

Full

💥LATEST UPDATE: #Gunra #Ransomware! Pub'd blog with following newer sections: 🎯GUNRA RAAS PANEL 🎯BUILD MODE INSEPCTION 🎯SAMPLE ANALYSIS 🎯DLS UPDATE theravenfile.com/2025/09/23/gun… #security #hack #DarkWeb #OSINT #ThreatIntel #ThreatIntelligence #CyberSecurity #malware #TOR

RakeshKrish12's tweet image. 💥LATEST UPDATE: #Gunra #Ransomware!

Pub'd blog with following newer sections:

🎯GUNRA RAAS PANEL
🎯BUILD MODE INSEPCTION
🎯SAMPLE ANALYSIS
🎯DLS UPDATE

theravenfile.com/2025/09/23/gun…

#security #hack #DarkWeb #OSINT #ThreatIntel #ThreatIntelligence #CyberSecurity #malware #TOR
RakeshKrish12's tweet image. 💥LATEST UPDATE: #Gunra #Ransomware!

Pub'd blog with following newer sections:

🎯GUNRA RAAS PANEL
🎯BUILD MODE INSEPCTION
🎯SAMPLE ANALYSIS
🎯DLS UPDATE

theravenfile.com/2025/09/23/gun…

#security #hack #DarkWeb #OSINT #ThreatIntel #ThreatIntelligence #CyberSecurity #malware #TOR
RakeshKrish12's tweet image. 💥LATEST UPDATE: #Gunra #Ransomware!

Pub'd blog with following newer sections:

🎯GUNRA RAAS PANEL
🎯BUILD MODE INSEPCTION
🎯SAMPLE ANALYSIS
🎯DLS UPDATE

theravenfile.com/2025/09/23/gun…

#security #hack #DarkWeb #OSINT #ThreatIntel #ThreatIntelligence #CyberSecurity #malware #TOR

Attacco #Ransomware alla Sapienza Università di Roma. Chiederei alla sottosegretaria @FaBergamotto cosa intende per "senza perdita di alcun dato" (già sentita per altri attacchi di cui sappiamo come è andata a finire: con la pubblicazione dei dati esfiltrati). Che il @csirt_it

sonoclaudio's tweet image. Attacco #Ransomware alla Sapienza Università di Roma.
Chiederei alla sottosegretaria @FaBergamotto cosa intende per "senza perdita di alcun dato" (già sentita per altri attacchi di cui sappiamo come è andata a finire: con la pubblicazione dei dati esfiltrati).
Che il @csirt_it

This Diamond Model from our “Cat’s Got Your Files: Lynx Ransomware” report illustrates the four core elements of the intrusion. See how all four vertices aligned for full-domain compromise 👇 thedfirreport.com/2025/12/17/cat… #DFIR #ThreatIntel #Ransomware #BlueTeam #CyberSecurity

TheDFIRReport's tweet image. This Diamond Model from our “Cat’s Got Your Files: Lynx Ransomware” report illustrates the four core elements of the intrusion.

See how all four vertices aligned for full-domain compromise 👇
thedfirreport.com/2025/12/17/cat…

#DFIR #ThreatIntel #Ransomware #BlueTeam #CyberSecurity

It's been nearly a year after the center was hit by a ransomware: cnews.link/cookeville-reg… #cybersecurity #ransomware

Cybernews's tweet image. It's been nearly a year after the center was hit by a ransomware: cnews.link/cookeville-reg…

#cybersecurity #ransomware

In January, the seizure of #RAMP disrupted the #ransomware community, forcing many actors to disperse across restricted forums such as #T1erOne and #Rehub. @insidedarknet conducted an exclusive interview with a @tieroneforum administrator. buymeacoffee.com/insidedarknet/…

club31337's tweet image. In January, the seizure of #RAMP disrupted the #ransomware community, forcing many actors to disperse across restricted forums such as #T1erOne and #Rehub.

@insidedarknet conducted an exclusive interview with a @tieroneforum administrator.

buymeacoffee.com/insidedarknet/…

A member of a #Darkweb forum promoted the #Gunra #Ransomware Affiliate Program 2026 and shared the details , the onion address of the group, a session ID and a qtox ID for the contact. "We invite pentesters and ethical hackers to our service program." added the actor

cyberfeeddigest's tweet image. A member of a #Darkweb forum promoted the #Gunra #Ransomware Affiliate Program 2026 and shared the details , the onion address of the group, a session ID and a qtox ID for the contact.

"We invite pentesters and ethical hackers to our service program."  added the actor

New Lamashtu #Ransomware Leak Site Lamashtu is a demon from Mesopotamia mythology. 8 Victims lamashtux5j74mcm7lwwgn5yrvuwtrpxjoyendif3v3hrztjesfoyayd[.]onion

fbgwls245's tweet image. New Lamashtu #Ransomware Leak Site

Lamashtu is a demon from Mesopotamia mythology.
8 Victims

lamashtux5j74mcm7lwwgn5yrvuwtrpxjoyendif3v3hrztjesfoyayd[.]onion

54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security dlvr.it/TS5yrt #CyberSecurity #Ransomware #Malware #EDR #BYOVD

blueteamsec1's tweet image. 54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security dlvr.it/TS5yrt #CyberSecurity #Ransomware #Malware #EDR #BYOVD

Loading...

Something went wrong.


Something went wrong.