Click here to download all references as Bib-File.•
2024-11-06
⋅
Cloudsek
⋅
Mozi Resurfaces as Androxgh0st Botnet: Unraveling The Latest Exploitation Wave Mozi |
2024-02-03
⋅
Cloudsek
⋅
From Discussion Forums to Malware Mayhem: The Alarming Rise of Abuse on Google Groups and Usenet CrackedCantil |
2023-10-31
⋅
Cloudsek
⋅
Phishing in the Oasis: Investigating the 2 year real estate data harvesting campaign targeting the Middle East |
2023-07-11
⋅
Cloudsek
⋅
Breaking into the Bandit Stealer Malware Infrastructure Bandit Stealer |
2023-02-03
⋅
Cloudsek
⋅
Threat Actors Abuse AI-Generated Youtube Videos to Spread Stealer Malware Alfonso Stealer Bandit Stealer Cameleon Fabookie Lumma Stealer Nanocore RAT Panda Stealer RecordBreaker RedLine Stealer Stealc STOP Vidar zgRAT |
2022-10-14
⋅
Cloudsek
⋅
Technical Analysis of BlueSky Ransomware BlueSky |
2022-09-30
⋅
Cloudsek
⋅
Technical Analysis of MedusaLocker Ransomware MedusaLocker |
2022-09-16
⋅
Cloudsek
⋅
Recordbreaker: The Resurgence of Raccoon Raccoon RecordBreaker |
2022-09-02
⋅
Cloudsek
⋅
What Is Redeemer Ransomware and How Does It Spread: A Technical Analysis |
2022-08-04
⋅
Cloudsek
⋅
Technical Analysis of Bumblebee Malware Loader BumbleBee |
2022-07-28
⋅
Cloudsek
⋅
Techniques, Tactics & Procedures (TTPs) Employed by Hacktivist Group DragonForce Malaysia |
2022-05-12
⋅
Cloudsek
⋅
Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group Pandora |
2022-04-04
⋅
Cloudsek
⋅
Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft, Okta, and Globant |
2022-03-28
⋅
Cloudsek
⋅
Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass |
2022-03-11
⋅
Cloudsek
⋅
In-depth Technical Analysis of Colibri Loader Malware Colibri Loader |
2022-03-03
⋅
Cloudsek
⋅
Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine HermeticWiper |
2022-02-17
⋅
Cloudsek
⋅
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2) Blister |
2022-01-07
⋅
Cloudsek
⋅
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1) Blister |
2021-12-30
⋅
Cloudsek
⋅
Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability Khonsari |
2021-12-22
⋅
Cloudsek
⋅
Emotet 2.0: Everything you need to know about the new Variant of the Banking Trojan Emotet |