Finally got a proper media server setup and chucked my old iTunes library on it!

RATM Ashes In The Fall is such a tune! ✊

Now for Sonic Firestorm... 🔊🔥

#jellyfin #Rage_against_the_machine #DragonForce #selfhosting #metal

PROMPTSPY, CEPEZED GEHACKT EN 90% RANSOMWARE VIA FIREWALLS

ESET onthulde PromptSpy, de eerste malware voor Android die Google Gemini AI misbruikt. Op ClawHub werden 1.184 kwaadaardige skills ontdekt. cepezed op leksite DragonForce. Barracuda: 90% ransomware begint bij firewalls.

https://www.ccinfo.nl/journaal/3018896_promptspy-cepezed-gehackt-en-90-ransomware-via-firewalls

#Cyberjournaal #ccinfo #PromptSpy #cepezed #DragonForce #Barracuda #ransomware #VoltTyphoon #cybersecurity #Nederland #Belgie

PromptSpy, cepezed gehackt en 90% ransomware via firewalls / Journaal | Cybercrimeinfo.nl

PromptSpy misbruikt Gemini AI, cepezed slachtoffer van DragonForce ransomware, Barracuda: 90% ransomware begint bij firewalls en Dell CVE CVSS 10.0.

[DRAGONFORCE] - Ransomware Victim: fivestates[.]com - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security
[DRAGONFORCE] - Ransomware Victim: cepezed[.]nl - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security
dragonforce details

Open, searchable ransomware group intelligence with live stats, posts and an API.

dragonforce details

Open, searchable ransomware group intelligence with live stats, posts and an API.

[DRAGONFORCE] - Ransomware Victim: CCR Solutions - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security
dragonforce details

Open, searchable ransomware group intelligence with live stats, posts and an API.

📢 S2W analyse le ransomware DragonForce, son RaaS « RansomBay » et ses variantes Windows/Linux
📝 Source : S2W (TALON) — Dans « Inside the Ecosystem, Operations: DragonForce », S2W dresse un panorama techn...
📖 cyberveille : https://cyberveille.ch/posts/2026-02-16-s2w-analyse-le-ransomware-dragonforce-son-raas-ransombay-et-ses-variantes-windows-linux/
🌐 source : https://medium.com/s2wblog/inside-the-ecosystem-operations-dragonforce-11048db4cbb0
#BYOVD #DragonForce #Cyberveille
S2W analyse le ransomware DragonForce, son RaaS « RansomBay » et ses variantes Windows/Linux

Source : S2W (TALON) — Dans « Inside the Ecosystem, Operations: DragonForce », S2W dresse un panorama technique et opérationnel du groupe ransomware DragonForce, actif depuis décembre 2023, en couvrant son cartel RaaS, son Data Leak Site (DLS), son panel affiliés, et l’évolution de ses binaires Windows et Linux. Le groupe a émergé avec des fuites de données sur BreachForums, en s’appuyant sur des éléments des codes sources LockBit 3.0 (LockBit Black) et Conti. Au 01/2026, le builder basé LockBit 3.0 n’est plus disponible. DragonForce promeut son écosystème via le service RansomBay et des offres différenciantes (p. ex. Harassment Calling, Data Analysis) pour élargir son influence RaaS.

CyberVeille
[DRAGONFORCE] - Ransomware Victim: hh2home[.]com - RedPacket Security

NOTE: No files or stolen information are exfiltrated, downloaded, taken, hosted, seen, reposted, or disclosed by RedPacket Security. Any legal issues relating

RedPacket Security