La Méduse, Médusa ou là Gorgone selon, pour Clarysse 🌿
Belle semaine à tous 🦚
#medusa #suncheyenn #suntattoo21 #montrevaultsurevre #beaupreauenmauges
La Méduse, Médusa ou là Gorgone selon, pour Clarysse 🌿
Belle semaine à tous 🦚
#medusa #suncheyenn #suntattoo21 #montrevaultsurevre #beaupreauenmauges
If you ever feel the need for a boost of self-confidence, try our exclusive Medusa Soap bar. Use it before a ritual or meditation to awaken your feminine strength and help channel that energy into your work, art, or daily life.
https://www.inkedgoddesscreations.com/products/medusa-soap
#Medusa
Mehdusa
#draw #drawing #draweveryday #dailydrawing #dailysketch #sketch #sketchbook #art #mastoart #artwork #comic #cartoon #meh #medusa #mehdusa #fun #silly #digitalink #digitalinkillustration #makeartnotwar #drawingaddict #whimsicalart #noai #charactersketch #characterart #characterconcept #characterdesign #conceptart #conceptillustration #illustration #illustrate #illustrator
Cisco Talos recently published an analysis of an EDR killer used by the #Qilin #ransomware gang. #ESETresearch tracks this threat as #CardSpaceKiller and we recently provided additional insights in our blog https://www.welivesecurity.com/en/eset-research/edr-killers-explained-beyond-the-drivers/
While we didn’t obtain direct evidence, we strongly believe that CardSpaceKiller is offered as a product on the darknet for reasons covered in the blog. We’ve detected it used by #Akira, #Medusa, and #MedusaLocker affiliates too.
The packer (identified as VX Crypt by Sophos) is not unique to this killer; it’s a PaaS used with other malware like #BumbleBee. But it is the single choice for the killer’s developer; unprotected samples were used only in 2025-02 https://www.sophos.com/en-us/blog/inside-shanya-a-packer-as-a-service-fueling-modern-attacks/
Beyond msimg32.dll mentioned in the Talos‘ blog, VX Crypt also names the payloads rtworkq.dll and version.dll, all abusing DLL side-loading for evasion. We’ve also observed an EXE variant in the wild, named 0th3r_av5.exe https://blog.talosintelligence.com/qilin-edr-killer/
Additional IoCs: 127B50C8185986A52AE66BF6E7E67A6FD787C4FC (version.dll)
22640D48F2E2A56C7A0708356B2B6990676B58B3 (version.dll)
3030DF03F36EC4C96B36B2E328FE3D7D9082811A (0th3r_av5.exe)
52D0358FF84295D231BC180CEDFDAF96631D67B4 (rtworkq.dll)
5D3CF785A440133A899412B800742716287D0B06 (msimg32.dll)
A3BDB419703A70157F2B7BD1DC2E4C9227DD9FE8 (0th3r_av5.exe)
Storm-1175 is hitting orgs with chained zero-days and dropping Medusa ransomware in under 24 hours.
Full write-up: https://forum.hashpwn.net/post/12014
#cybersecurity #storm1175 #zeroday #medusa #ransomeware #windows #news #hashpwn
📢 Storm-1175 : campagnes Medusa ransomware à haute cadence ciblant les actifs web exposés
📝 ## 🧭 Contexte
Source : Microsoft...
📖 cyberveille : https://cyberveille.ch/posts/2026-04-09-storm-1175-campagnes-medusa-ransomware-a-haute-cadence-ciblant-les-actifs-web-exposes/
🌐 source : https://www.microsoft.com/en-us/security/blog/2026/04/06/storm-1175-focuses-gaze-on-vulnerable-web-facing-assets-in-high-tempo-medusa-ransomware-operations/
#Medusa #Medusa_ransomware #Cyberveille
🧭 Contexte Source : Microsoft Security Blog — Publication du 6 avril 2026. Analyse de menace produite par Microsoft Threat Intelligence portant sur l’acteur Storm-1175, un groupe cybercriminel à motivation financière opérant des campagnes ransomware Medusa à haute cadence. 🎯 Profil de l’acteur Storm-1175 est un acteur cybercriminel financièrement motivé, caractérisé par un tempo opérationnel élevé et une forte capacité à identifier des actifs périmètre exposés. Il exploite la fenêtre temporelle entre la divulgation publique d’une vulnérabilité et l’adoption généralisée des correctifs.
💥BATTLE DER GIGANTEN💥
Zwei Figuren aus der griechischen Mythologie treten gegeneinander an und ihr entscheidet wer gewinnt!
Wer ist stärker? Und wieso? Wer hat die fieseren Tricks?
Heute:
🕶️Geblendeter vs Todesblick👁️
...3...2...1...FIGHT!💥
#daschaosundseinekinder #battledergiganten #olympia #olympischespiele #ödipus #Medusa #schlangen #blind #kampf #wergewinnt #griechischemythologie #chaos #antike
📢 Storm-1175 hackers are launching high-speed Medusa ransomware attacks against healthcare and education sectors in the UK, US, and Australia by exploiting security flaws in as little as 24 hours.
Read: https://hackread.com/storm-1175-hackers-24-hour-medusa-ransomware-flaw/
#CyberSecurity #Vulnerability #Storm1175 #Medusa #Ransomware