{
	"id": "285fcd16-be56-4f91-a54c-7ba732fbf9ed",
	"created_at": "2026-04-06T00:21:06.672984Z",
	"updated_at": "2026-04-10T03:20:25.696295Z",
	"deleted_at": null,
	"sha1_hash": "8ec8e3db9532d9d08e146147972d48fe646d250a",
	"title": "Tesorion: Your Partner in Comprehensive Cybersecurity Solutions​",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 89550,
	"plain_text": "Tesorion: Your Partner in Comprehensive Cybersecurity Solutions\r\nArchived: 2026-04-05 15:16:42 UTC\r\nOur model\r\nTesorion is a multidisciplinary cybersecurity company with 100% focus on four key security disciplines: Security\r\nMonitoring, Offensive Security, Security Advisory, and Incident Response.\r\nOur Managed Detection \u0026 Response (MDR) service and Tesorion Security Operations Center (T-SOC) form the\r\ncore of our comprehensive security portfolio, covering everything from predicting and preventing threats to\r\ndetecting and responding to incidents.\r\nWith our holistic approach, we provide a tailored and cost-effective solution for every situation, context, and risk\r\nprofile. We cover all security domains—Endpoints, Networks, Cloud, Identity, and Applications—fully integrated\r\nwith advanced detection and response technologies.\r\nAt\r\nTesorion,\r\nwe\r\nbelieve\r\nthat\r\ncyber\r\nmaturity\r\ngrows\r\nthrough\r\ncollaboration.\r\nOur\r\napproachable\r\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 1 of 6\n\nspecialists\r\nwork\r\nside\r\nby\r\nside\r\nwith\r\nyour\r\nteam\r\nevery\r\nday\r\nto\r\nstrengthen\r\nyour\r\norganization’s\r\ncyber\r\nmaturity.\r\nBy\r\ncombining\r\nexpertise\r\nacross\r\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 2 of 6\n\nvarious\r\ncybersecurity\r\ndisciplines,\r\nwe\r\nensure\r\nan\r\neffective\r\napproach\r\nto\r\npredicting,\r\npreventing,\r\ndetecting,\r\nand\r\nresponding\r\nto\r\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 3 of 6\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 4 of 6\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 5 of 6\n\nTrusted by leading organizations\r\nSource: https://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 6 of 6",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"references": [
		"https://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/"
	],
	"report_names": [
		"analysis-of-the-blackmatter-ransomware"
	],
	"threat_actors": [],
	"ts_created_at": 1775434866,
	"ts_updated_at": 1775791225,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/8ec8e3db9532d9d08e146147972d48fe646d250a.pdf",
		"text": "https://archive.orkl.eu/8ec8e3db9532d9d08e146147972d48fe646d250a.txt",
		"img": "https://archive.orkl.eu/8ec8e3db9532d9d08e146147972d48fe646d250a.jpg"
	}
}