
Read all Blogs from this Author
CloudSEK’s report details a persistent nine-month RondoDoX botnet campaign targeting IoT devices and web applications. Recently, the threat actors have shifted to weaponizing a critical Next.js vulnerability, deploying malicious payloads like "React2Shell" and cryptominers. This analysis offers crucial insights into their evolving infrastructure and provides defensive recommendations to mitigate these sophisticated attacks.
APT35 (Charming Kitten) operates a professional malware ecosystem featuring Saqeb System and RAT-2AC2 RATs, custom webshells, and FUD-tested modules. The group’s C2 uses TOR, multi-hop relays, and encrypted traffic for persistence and stealth. Targeting airlines, law enforcement, and regional infrastructure (2022-2025), it links cyber operations to IRGC geopolitical objectives
Read all Whitepapers and reports from this Author

CloudSEK’s Middle East Threat Landscape Report 2025 reveals a sharp surge in cyber attacks led by state-aligned hacktivists, ransomware groups, and dark-web marketplaces. Finance, Government, and Telecom emerged as top targets, with 748+ coordinated incidents and escalating data leaks, extortion, and sector-specific breaches. A concise, high-impact report that leaders must read to understand 2025’s evolving threats
Read MoreRead all knowledge base articles from this Author