Click here to download all references as Bib-File.
2023-10-31 ⋅ Cloudsek ⋅ Phishing in the Oasis: Investigating the 2 year real estate data harvesting campaign targeting the Middle East |
2023-07-11 ⋅ Cloudsek ⋅ Breaking into the Bandit Stealer Malware Infrastructure Bandit Stealer |
2022-10-14 ⋅ Cloudsek ⋅ Technical Analysis of BlueSky Ransomware BlueSky |
2022-09-30 ⋅ Cloudsek ⋅ Technical Analysis of MedusaLocker Ransomware MedusaLocker |
2022-09-16 ⋅ Cloudsek ⋅ Recordbreaker: The Resurgence of Raccoon Raccoon RecordBreaker |
2022-09-02 ⋅ Cloudsek ⋅ What Is Redeemer Ransomware and How Does It Spread: A Technical Analysis |
2022-08-04 ⋅ Cloudsek ⋅ Technical Analysis of Bumblebee Malware Loader BumbleBee |
2022-07-28 ⋅ Cloudsek ⋅ Techniques, Tactics & Procedures (TTPs) Employed by Hacktivist Group DragonForce Malaysia |
2022-05-12 ⋅ Cloudsek ⋅ Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group Pandora |
2022-04-04 ⋅ Cloudsek ⋅ Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft, Okta, and Globant |
2022-03-28 ⋅ Cloudsek ⋅ Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass |
2022-03-11 ⋅ Cloudsek ⋅ In-depth Technical Analysis of Colibri Loader Malware Colibri Loader |
2022-03-03 ⋅ Cloudsek ⋅ Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine HermeticWiper |
2022-02-17 ⋅ Cloudsek ⋅ Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2) Blister |
2022-01-07 ⋅ Cloudsek ⋅ Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1) Blister |
2021-12-30 ⋅ Cloudsek ⋅ Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability Khonsari |
2021-12-22 ⋅ Cloudsek ⋅ Emotet 2.0: Everything you need to know about the new Variant of the Banking Trojan Emotet |