Click here to download all references as Bib-File.
2022-10-14 ⋅ Cloudsek ⋅ Technical Analysis of BlueSky Ransomware BlueSky |
2022-09-30 ⋅ Cloudsek ⋅ Technical Analysis of MedusaLocker Ransomware MedusaLocker |
2022-09-16 ⋅ Cloudsek ⋅ Recordbreaker: The Resurgence of Raccoon Raccoon RecordBreaker |
2022-08-04 ⋅ Cloudsek ⋅ Technical Analysis of Bumblebee Malware Loader BumbleBee |
2022-05-12 ⋅ Cloudsek ⋅ Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group Pandora |
2022-03-28 ⋅ Cloudsek ⋅ Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass |
2022-03-03 ⋅ Cloudsek ⋅ Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine HermeticWiper |
2022-02-17 ⋅ Cloudsek ⋅ Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2) Blister |
2022-01-07 ⋅ Cloudsek ⋅ Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1) Blister |
2021-12-30 ⋅ Cloudsek ⋅ Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability Khonsari |
2021-12-22 ⋅ Cloudsek ⋅ Emotet 2.0: Everything you need to know about the new Variant of the Banking Trojan Emotet |