Author: CloudSEK

Read our latest blog posts

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)

A new malware, dubbed “Blister,” by the Elastic Security team that identified it, is leveraging valid code-signing...

Continue reading

Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability

The Log4J vulnerability, which is being actively exploited in the wild, has led to a significant spike...

Continue reading

Emotet 2.0: Everything you need to know about the new Variant...

Since it was first identified in 2014, the Emotet banking trojan has been a persistent threat that...

Continue reading

Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 2/2)

We continue to track the behaviour of the DJVU/STOP ransomware in this 2nd part of the 2...

Continue reading

Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 1/2)

We delve into the modus operandi of the DJVU/STOP ransomware, its technicalities and features, how it identifies...

Continue reading

The Shang-Chi Malware Campaign: Is your pirated copy of the summer...

A recent campaign is spreading malware embedded in pirated copies of popular summer blockbusters like Shang-Chi and...

Continue reading

Disgruntled Affiliate Reveals Conti Ransomware Attack Techniques

The group has actively targeted the healthcare industry and first responder networks when COVID was at its...

Continue reading

Kaseya VSA Supply Chain Ransomware Incident

On 02 July 2021, Kaseya disclosed that they were the victim of a large-scale ransomware attack. Here...

Continue reading

Domino’s Breach and the Nucleus ransomware attack: More than just isolated...

We are investigating the possible attack vectors that could have led to the compromise of Domino’s Breach...

Continue reading

Why you should be worried about a cyber pandemic that could...

This article explains how effective threat intelligence can assist you in taking proactive measures to counter cyber...

Continue reading