CloudSEK Logo
Home
Product
Nexus
AI-Powered Command Center and Cyber Risk Quantification
XVigil
External Digital Risk Protection
BeVigil
External Attack Surface Monitoring
SVigil
Software and Supply chain Risk Monitoring and Protection
Threat Intelligence
Cyber Threat Intel, IAVs, Threat Actor Directory & More
BeVigil Community
Application Scanner
Exposure
Check if your organisation's data is in a data breach
Solutions
Cyber Threats Monitoring
Dark web monitoring
Brand Threats Monitoring
Infrastructure Monitoring
Partner Secret Scanning
BeVigil Jenkins CI
BeVigil OSINT CLI
BeVigil Asset Explorer
Resources

Resources

Blog
The latest industry news, updates and info.
Threat Intelligence
Get up and running on new threat reports and techniques.
Knowledge Base
Basics of Cybersecurity and see more definitions
Whitepapers & Reports
The content team broke their backs making these reports.
Customer stories
Learn how our customers are making big changes. You have got good company!
CloudSEK Academy
Be CloudSEK certified!

Company

Integrations
We are more connected than you know. Explore all Integrations
Partners
100s of partners and one Shared goal; Secure future for all us.
About us
Learn about our story and our mission statement.
Life at CloudSEK
A sneak peek at the awesome life at CloudSEK.
Careers
We're hiring!
We are in love with undeniable talent. Join our team!
Legal
All the boring but necessary legalese that legal made us add.

Resources

Blog Posts

CloudSEK Raises $19 Million in Series B1 Funding to Scale Predictive Cybersecurity Platform
CloudSEK Raises $19 Million in Series B1 Funding to Scale Predictive Cybersecurity Platform
Read Now
All Blog Posts

Whitepapers & Reports

Quarterly IAV Roundup: Initial Access & Database Brokers
Quarterly IAV Roundup: Initial Access & Database Brokers
Read the Report now!
All Reports
Log in
Schedule a Demo
CloudSEK TRIAD

CloudSEK TRIAD

CloudSEK Threat Research and Information Analytics Division

Blogs & Articles

Read all Blogs from this Author

Blog image
The Biggest Supply Chain Hack Of 2025: 6M Records Exfiltrated from Oracle Cloud affecting over 140k Tenants

CloudSEK uncovers a major breach targeting Oracle Cloud, with 6 million records exfiltrated via a suspected undisclosed vulnerability. Over 140,000 tenants are impacted, as the attacker demands ransom and markets sensitive data online. Learn the full scope, risks, and how to respond. Are you worried your organization might be affected? Check your exposure here - https://exposure.cloudsek.com/oracle

Read More
Blog image
Cyber Monday Scams: A Comprehensive Analysis of Threats and Mitigation Strategies

The blog explores the growing threat landscape of Cyber Monday scams, detailing the diverse tactics cybercriminals use to exploit the online shopping surge. Key threats include phishing attacks, fake online marketplaces, social media scams, fraudulent gift card generators, and advanced tools like Malware-as-a-Service (MaaS). Psychological manipulation tactics—such as urgency, authority, and social proof—amplify the success of these schemes.

Read More
Next

Whitepapers and Reports

Read all Whitepapers and reports from this Author

Threat Landscape Report for Middle East 2024

Read More
Beyond the Storefront: E-commerce and Retail Threat Insights

The report "Beyond the Storefront: E-commerce and Retail Threat Insights" highlights the growing cyber threats to the e-commerce and retail sectors, including a surge in ransomware attacks, hacktivist activities, and data breaches. It emphasizes the need for enhanced security measures as these industries face increasing risks from financially motivated attacks and politically driven hacktivism.

Read More
MichaMichaBot: Unveiling the Exploitation of Missing "X-Frame-Options" HTTP Headers in Phishing Attacks

The report "MichaMichaBot: Unmasking the Threats Exploiting Missing 'X-Frame-Options' Headers" reveals how cybercriminals exploit this vulnerability to launch phishing attacks by embedding legitimate websites in iframes with fake login panels. It provides insights into these attack methods and practical strategies to secure digital assets against such threats.

Read More
Unveiling Maorrisbot: The Inner Workings of an Android Trojan Malware

Our whitepaper, "Unveiling Maorrisbot: The Inner Workings of an Android Trojan Malware," explores the sophisticated methods and impacts of Maorrisbot malware, offering insights and strategies to protect your devices. Download it to learn how to safeguard against this significant Android threat.

Read More

Knowledge Base

Read all knowledge base articles from this Author

No Knowledge base articles found.
Join our newsletter
We’ll send you a nice letter once per week. No spam.
Untitled UI logotextLogo
Product
XVigil
BeVigil
SVigil
New
Tutorials
Pricing
Releases
Company
About us
Careers
Press
News
Media kit
Contact
Resources
Blog
Newsletter
Events
Help centre
Tutorials
Support
Use Cases
Startups
Enterprise
Government
SaaS
Marketplaces
Ecommerce
Social
Twitter
LinkedIn
Facebook
GitHub
AngelList
Dribbble
© 2077 Untitled UI
PrivacyGDPRDisclosure of Vulnerability
Products
XVigil
BeVigil Enterprise
SVigil
BeVigil
CloudSEK Exposure
Mobile App
Google Play button to download App
Solutions
Cyber Threats Monitoring
Dark Web Monitoring
Brand Threat Monitoring
Infra Threat Monitoring
Partners Secret Scanning
BeVigil Jenkins CI
BeVigil OSINT CLI
BeVigil Asset Explorer
Takedowns
Resources
Blogs and Articles
Threat Intelligence
Whitepapers and Reports
Knowledge Base
Integrations
Community
Discord Community
Company
About us
Customers
Partners
Life at CloudSEK
Secure Sips
Careers
Announcements
Press
Contact Us
CloudSEK Logo
Linkedin Icon

At CloudSEK, we combine the power of Cyber Intelligence, Brand Monitoring, Attack Surface Monitoring, Infrastructure Monitoring and Supply Chain Intelligence to give context to our customers’ digital risks.

GDPR Policy
Privacy
Vulnerability Disclosure
Subscribe our newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.