Latest Posts

Critical SharePoint Vulnerability CVE-2025-53770: Remote Code Execution via ViewState Abuse

20 Jul 2025

DarkAtlas Squad
DarkWeb

Critical SharePoint Vulnerability CVE-2025-53770: Remote Code Execution via ViewState Abuse

On the evening of July 18, 2025, active and large-scale exploitation of a newly discovered SharePoint remote code execution (RCE) vulnerability chain—dubbed “ToolShell“—was observed in the wild. Initially demonstrated just days earlier on X, the exploit is being used to compromise on-premises SharePoint servers worldwide. The vulnerability chain, detailed in this blog, was later assigned […]

How Shortcut Files (.LNK) used to Deliver Ransomware

17 Jul 2025

Dark Atlas
DarkAtlas Squad

How Shortcut Files (.LNK) used to Deliver Ransomware

Windows Shortcut files — commonly known as LNK files — are a core part of the Windows ecosystem. They allow users to create convenient links to files, folders, or applications without duplicating the original. You’ve probably used them on your desktop to quickly launch software or access frequently used directories. LNK File Structure (Simplified) A typical LNK file contains: […]

Info Stealers 101: Everything You Should Know

16 Jul 2025

Dark Atlas
DarkWeb

Info Stealers 101: Everything You Should Know

In today’s rapidly evolving cyber threat landscape, information stealers — or “infostealers” — have become a pervasive and escalating threat. These stealthy malware variants are specifically engineered to harvest sensitive data from compromised systems, including credentials, financial information, and personal identifiers, and exfiltrate it to remote attackers for exploitation. Both individuals and organizations are increasingly […]

Categories

Discover the latest articles and insights on Dark Atlas

All
Threat Intelligence
Malware Analysis
Infrastructure adversary hunting
Uncategorized
Image placeholder

Image placeholder

Image placeholder

Image placeholder

Image placeholder

Image placeholder

Image placeholder

Image placeholder

Image placeholder

Contact Us

Experience the power of #1 AI-Powered eXtended Cyber Intelligence Platform

Subscribe

New Security Updates Weekly!