Click here to download all references as Bib-File.•
| 2025-07-25
⋅
Cloudsek
⋅
Threat Actors Lure Victims Into Downloading .HTA Files Using ClickFix To Spread Epsilon Red Ransomware Epsilon Red |
| 2024-11-06
⋅
Cloudsek
⋅
Mozi Resurfaces as Androxgh0st Botnet: Unraveling The Latest Exploitation Wave Mozi |
| 2024-02-03
⋅
Cloudsek
⋅
From Discussion Forums to Malware Mayhem: The Alarming Rise of Abuse on Google Groups and Usenet CrackedCantil |
| 2023-10-31
⋅
Cloudsek
⋅
Phishing in the Oasis: Investigating the 2 year real estate data harvesting campaign targeting the Middle East |
| 2023-07-11
⋅
Cloudsek
⋅
Breaking into the Bandit Stealer Malware Infrastructure Bandit Stealer |
| 2023-02-03
⋅
Cloudsek
⋅
Threat Actors Abuse AI-Generated Youtube Videos to Spread Stealer Malware Alfonso Stealer Bandit Stealer Cameleon Fabookie Lumma Stealer Nanocore RAT Panda Stealer RecordBreaker RedLine Stealer Stealc STOP Vidar zgRAT |
| 2023-01-04
⋅
CSO Online
⋅
Cyberattacks against governments jumped 95% in last half of 2022, CloudSek says BlueHornet |
| 2022-11-02
⋅
CySecurity News
⋅
Missile Supplier MBDA Breach Disclosed by CloudSEK Adrastea |
| 2022-10-14
⋅
Cloudsek
⋅
Technical Analysis of BlueSky Ransomware BlueSky |
| 2022-09-30
⋅
Cloudsek
⋅
Technical Analysis of MedusaLocker Ransomware MedusaLocker |
| 2022-09-16
⋅
Cloudsek
⋅
Recordbreaker: The Resurgence of Raccoon Raccoon RecordBreaker |
| 2022-09-02
⋅
Cloudsek
⋅
What Is Redeemer Ransomware and How Does It Spread: A Technical Analysis |
| 2022-08-04
⋅
Cloudsek
⋅
Technical Analysis of Bumblebee Malware Loader BumbleBee |
| 2022-07-28
⋅
Cloudsek
⋅
Techniques, Tactics & Procedures (TTPs) Employed by Hacktivist Group DragonForce Malaysia |
| 2022-05-12
⋅
Cloudsek
⋅
Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group Pandora |
| 2022-04-04
⋅
Cloudsek
⋅
Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft, Okta, and Globant |
| 2022-03-28
⋅
Cloudsek
⋅
Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass |
| 2022-03-11
⋅
Cloudsek
⋅
In-depth Technical Analysis of Colibri Loader Malware Colibri Loader |
| 2022-03-03
⋅
Cloudsek
⋅
Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine HermeticWiper |
| 2022-02-17
⋅
Cloudsek
⋅
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2) Blister |
| 2022-01-07
⋅
Cloudsek
⋅
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1) Blister |
| 2021-12-30
⋅
Cloudsek
⋅
Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability Khonsari |
| 2021-12-22
⋅
Cloudsek
⋅
Emotet 2.0: Everything you need to know about the new Variant of the Banking Trojan Emotet |