Read all Blogs from this Author
Threat actors have been abusing advertisement services to serve malware to users and redirect traffic to websites purchasing services from them.
Dive into the depths of the dark web, understanding its nature, operations, and the role of Tor in offering online anonymity. Discover how dark web forums function and the significance of their security measures.
Read all Whitepapers and reports from this Author
Our whitepaper, "Unveiling Maorrisbot: The Inner Workings of an Android Trojan Malware," explores the sophisticated methods and impacts of Maorrisbot malware, offering insights and strategies to protect your devices. Download it to learn how to safeguard against this significant Android threat.
Read MoreXVigil’s Fake Customer Care Number module scours the internet for fake customer care numbers. In this report, CloudSEK researchers have analyzed a sample of ~20,000 Indian mobile numbers used by threat actors, to run such customer care scams.
Read MoreCloudSEK’s contextual AI digital risk platform XVigil is closely monitoring underground cybercrime forums for cyberattacks against Indonesia.
Read MoreRead all knowledge base articles from this Author