
Posts by Christiaan Beek

Products and Tools
Identifying and Mitigating Potential Velociraptor Abuse
Christiaan Beek

Vulnerabilities and Exploits
CVE-2025-61882: Critical 0day in Oracle E-Business Suite exploited in-the-wild
Stephen Fewer, Christiaan Beek

Threat Research
From .pth to p0wned: Abuse of Pickle Files in AI Model Supply Chains
Christiaan Beek

Detection and Response
Why is Ransomware Still a Thing in 2025?
Christiaan Beek

Threat Research
The 2024 Ransomware Landscape: Looking back on another painful year
Christiaan Beek

Detection and Response
Modular Java Backdoor Dropped in Cleo Exploitation Campaign
Christiaan Beek

Industry Trends
Why Cybercriminals Are Not Necessarily Embracing AI
Christiaan Beek

Detection and Response
Selling Ransomware Breaches: 4 Trends Spotted on the RAMP Forum
Christiaan Beek

Threat Research
2023 Ransomware Stats: A Look Back To Plan Ahead
Christiaan Beek

Threat Research
The Risks of Exposing DICOM Data to the Internet
Christiaan Beek

Products and Tools
Little Crumbs Can Lead To Giants
Christiaan Beek

Detection and Response
Evasion Techniques Uncovered: An Analysis of APT Methods
Christiaan Beek