Our Blog

Read our latest blog posts

YourCyanide: An Investigation into ‘The Frankenstein’ Ransomware that Sends Malware Laced...

Authors: Anandeshwar Unnikrishnan, Rishika Desai, Benila Susan Jacob Executive Summary CloudSEK’s contextual AI digital risk monitoring platform...

Continue reading

Analysis and Attribution of the Eternity Ransomware: Timeline and Emergence of...

XVigil discovered a financially motivated threat actor group, dubbed Eternity, actively operating on the internet, selling worms,...

Continue reading

Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group

2021 saw an outbreak of ransomware groups and attacks that affected every major industry across the globe....

Continue reading

Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft,...

Detailed profile on the Cybercriminal group and Threat Actor - Lapsus$ Group. The ransomware gang leaked source...

Continue reading

Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass

Adversaries have been abusing Macros ever since the advent of the internet. This blog shows how threat...

Continue reading

In-depth Technical Analysis of Colibri Loader Malware

On 27 August 2021, cybersecurity researchers discovered Colibri loader malware being sold on an underground Russian forum....

Continue reading

Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine

Technical analysis of destructive malware, dubbed “Hermetic Wiper,“ targeting Ukrainian computers and websites. The malware then renders...

Continue reading

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2)

The blister is a code-signed malware that drops a malicious DLL file on the victim’s system, which...

Continue reading

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)

A new malware, dubbed “Blister,” by the Elastic Security team that identified it, is leveraging valid code-signing...

Continue reading

Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability

The Log4J vulnerability, which is being actively exploited in the wild, has led to a significant spike...

Continue reading