Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator ProfileNovember 25, 2025m.farghalyWhat Is Valkyrie Stealer? Valkyrie Stealer is a C++ infostealer designed to collect credentials, system information, browser data, messaging-app sessions,…
Threat Actor Profile: APT27September 15, 2025m.farghalyWho is APT27? APT27 — also known as Emissary Panda, Iron Tiger, and LuckyMouse — is a Chinese state-sponsored cyber-espionage…
Incransom Targets Bergen Community CollegeMay 19, 2026intelfeedsIncransom has launched a ransomware attack against Bergen Community College, threatening to leak 1TB of sensitive data if negotiations are…
What Is a Combo List on the Dark Web? May 18, 2026Mark CyberA combo list is a compiled file of stolen username and password pairs, harvested from data breaches, malware infections, and…
Incransom Launches Ransomware Attack on Monterey Mushrooms, LLCSeptember 4, 2023intelfeedsMonterey Mushrooms, LLC, the largest marketer of fresh mushrooms in the USA, has fallen victim to a ransomware attack by…
Akira Ransomware Targets Moorman HartingNovember 1, 2023intelfeedsThe Akira ransomware group has claimed responsibility for a cyberattack on Moorman Harting, a U.S.-based wealthcare firm. The attack threatens…
Egyptian Organizations Darkweb Exposure ReportMarch 17, 2025adminAre you wondering what kind of information about the Egyptian organizations the Darkweb has? As we all remember, the last…