Follow on X RSS Feed
Cybersec Sentinel
  • Home
  • News
  • Malware
  • Ransomware
  • Vulnerabilities
  • Articles
  • About
  • FAQ

Cobalt Strike

A collection of 2 posts
Matanbuchus 3.0 Campaign Exploits Quick Assist and Teams for Initial Access
Malware

Matanbuchus 3.0 Campaign Exploits Quick Assist and Teams for Initial Access

Threat Group: ShadowSyndicate Threat Type: Malware Loader / Malware-as-a-Service (MaaS) Exploited Vulnerabilities: Social engineering of Microsoft Teams and Quick Assist trust Malware Used: Matanbuchus 3.0 Threat Score: ⛔ High (7.5/10) – Due to its advanced evasion capabilities, stealthy deployment, abuse of collaboration tools, and targeting of high-value enterprise environments. Last
Jul 20, 2025 4 min read
Threat Actor Azote Group Expands Nitrogen Ransomware Campaign Targeting IT and Finance
Ransomware

Threat Actor Azote Group Expands Nitrogen Ransomware Campaign Targeting IT and Finance

Threat Group: Azote Group / UNC4696 Threat Type: Ransomware (Double Extortion), Initial Access Broker Exploited Vulnerabilities: Malvertising, DLL Sideloading, Vulnerable Drivers, Social Engineering Malware Used: NitrogenLoader, NitrogenInstaller, NitrogenStager, Sliver, Cobalt Strike, BlackCat/ALPHV, KeeLoader Threat Score: 🔥 Critical (9.1/10) – Due to its modular, evasive attack chain, and confirmed links to
May 20, 2025 3 min read
Page 1 of 1
Cybersec Sentinel © 2026
  • Privacy Policy
Powered by Ghost