{
	"id": "dccf5e2d-9342-4617-b6e1-a17438ab850d",
	"created_at": "2026-05-05T02:45:04.512004Z",
	"updated_at": "2026-05-05T02:46:36.873066Z",
	"deleted_at": null,
	"sha1_hash": "f7f2e4ebb427fda273a8df07376c450af045b4a4",
	"title": "Tesorion: Your Partner in Comprehensive Cybersecurity Solutions​",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 720350,
	"plain_text": "Tesorion: Your Partner in Comprehensive Cybersecurity Solutions\r\nArchived: 2026-05-05 02:22:03 UTC\r\nOur model\r\nTesorion is a multidisciplinary cybersecurity company with 100% focus on four key security disciplines: Security\r\nMonitoring, Offensive Security, Security Advisory, and Incident Response.\r\nOur Managed Detection \u0026 Response (MDR) service and Tesorion Security Operations Center (T-SOC) form the\r\ncore of our comprehensive security portfolio, covering everything from predicting and preventing threats to\r\ndetecting and responding to incidents.\r\nWith our holistic approach, we provide a tailored and cost-effective solution for every situation, context, and risk\r\nprofile. We cover all security domains—Endpoints, Networks, Cloud, Identity, and Applications—fully integrated\r\nwith advanced detection and response technologies.\r\nAt\r\nTesorion,\r\nwe\r\nbelieve\r\nthat\r\ncyber\r\nmaturity\r\ngrows\r\nthrough\r\ncollaboration.\r\nOur\r\napproachable\r\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 1 of 21\n\nspecialists\r\nwork\r\nside\r\nby\r\nside\r\nwith\r\nyour\r\nteam\r\nevery\r\nday\r\nto\r\nstrengthen\r\nyour\r\norganization’s\r\ncyber\r\nmaturity.\r\nBy\r\ncombining\r\nexpertise\r\nacross\r\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 2 of 21\n\nvarious\r\ncybersecurity\r\ndisciplines,\r\nwe\r\nensure\r\nan\r\neffective\r\napproach\r\nto\r\npredicting,\r\npreventing,\r\ndetecting,\r\nand\r\nresponding\r\nto\r\ncyber\r\nthreats.\r\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 3 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 4 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 5 of 21\n\nTrusted by leading organizations\r\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 6 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 7 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 8 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 9 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 10 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 11 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 12 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 13 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 14 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 15 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 16 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 17 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 18 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 19 of 21\n\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 20 of 21\n\nSource: https://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nhttps://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/\r\nPage 21 of 21",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.tesorion.nl/en/posts/analysis-of-the-blackmatter-ransomware/"
	],
	"report_names": [
		"analysis-of-the-blackmatter-ransomware"
	],
	"threat_actors": [],
	"ts_created_at": 1777949104,
	"ts_updated_at": 1777949196,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/f7f2e4ebb427fda273a8df07376c450af045b4a4.pdf",
		"text": "https://archive.orkl.eu/f7f2e4ebb427fda273a8df07376c450af045b4a4.txt",
		"img": "https://archive.orkl.eu/f7f2e4ebb427fda273a8df07376c450af045b4a4.jpg"
	}
}