Tag: Research

Read our latest blog posts

Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass

Adversaries have been abusing Macros ever since the advent of the internet. This blog shows how threat...

Continue reading

In-depth Technical Analysis of Colibri Loader Malware

On 27 August 2021, cybersecurity researchers discovered Colibri loader malware being sold on an underground Russian forum....

Continue reading

Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)

A new malware, dubbed “Blister,” by the Elastic Security team that identified it, is leveraging valid code-signing...

Continue reading

Cryptocurrency: An Emerging Target for Cyberattacks

Based on a study by CloudSEK researchers, cryptocurrency related cyber attacks accounted for 2.9% of all reported...

Continue reading

Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 2/2)

We continue to track the behaviour of the DJVU/STOP ransomware in this 2nd part of the 2...

Continue reading

Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 1/2)

We delve into the modus operandi of the DJVU/STOP ransomware, its technicalities and features, how it identifies...

Continue reading

Advanced Automated Social Engineering Bots: The High Tide of Social Engineering...

This article provides an overview of SMS Ranger and how OTP bots are exploited by threat actors.

Continue reading

The Unabated Reign of ATM Hacking: The 2021 Rajasthan ATM Attack...

Here are the specifics of the numerous physical and electronic attack vectors used by ATM hackers, highlighting...

Continue reading

Disgruntled Affiliate Reveals Conti Ransomware Attack Techniques

The group has actively targeted the healthcare industry and first responder networks when COVID was at its...

Continue reading

CloudSEK’s Selenium Grid Architecture and Data Acquisition

We discuss the various components of a complex Selenium Grid architecture to help readers understand how singular...

Continue reading