Read insightful articles on cybersecurity, threat intelligence, and risk management on the CloudSEK Blog. Stay ahead of cyber threats and protect your organization.
CloudSEK Blog

Inside the Infamous Royal Ransomware Group: Unveiling Their Reign of Cyber Chaos

The Royal ransomware group is a relatively new player in the world of cybercrime, with its earliest known activity dating back to mid-2022. From all the victims that the group has posted, we have calculated that the Royal Ransomware group has leaked a whopping 249+ Terabytes of data to date.
Read post
CloudSEK Blog

DogeRAT: The Android Malware Campaign Targeting Users Across Multiple Industries

CloudSEK’s TRIAD team discovered yet another open-source Android malware called DogeRAT (Remote Access Trojan), targeting a large customer base across multiple industries, especially Banking and Entertainment. Although the majority of this campaign targeted users in India, it is intended to have a global reach.
Read post
CloudSEK Blog

Technical Analysis of ALPHV/BlackCat Ransomware

A thorough technical analysis of BlackCat ransomware, which has been causing havoc for organizations across the world. ALPHV, also known as BlackCat, is a ransomware family first seen in late 2021 and has been targeting multiple firms across industries.
Read post
CloudSEK Blog

BidenCash Business Expansion: SSH Server Access Now Available on Dark Web

BidenCash, a notorious marketplace for selling leaked credit card information, has expanded its services by offering SSH access to buyers for as low as $2. This new offering can have severe consequences for cybersecurity.
Read post
CloudSEK Blog

Users of Popular Android Applications Risk Getting Compromised Via Highly Privileged Device Migration Tools

CloudSEK’s researchers identified that multiple applications do not invalidate or revalidate session cookies if app data is transferred from one device to another.
Read post
CloudSEK Blog

Unleashing the Full Potential of Bug Bounty Programs with BeVigil: Streamlining the Workflow of Security Researchers

BeVigil can significantly simplify and enhance the workflow of bug bounty researchers. With BeVigil's innovative approach, researchers can leverage a straightforward workflow that requires fewer steps to identify vulnerabilities and earn bounties.
Read post
CloudSEK Blog

Mobile App Security: The Ultimate Guide to Building Safer Mobile Apps with BeVigil Jenkins Extension

Learn how to improve the security of your mobile apps using BeVigil Jenkins Extension. This comprehensive guide will help you create secure mobile apps that protect user data and prevent unauthorized access. Discover how to use Jenkins integration to automate security testing and ensure your app is secure before release.
Read post
CloudSEK Blog

Technical Analysis of Files Used in 3CX Desktop App Malware Campaign

On 29th March 2023, reports emerged of malicious activities originating from a signed 3CX desktop application. Trojanized versions of the 3CX desktop app load a DLL with malicious content. The DLL launches a multi-staged attack on the victim machine, the final stage being the deployment of an unidentified info stealer.
Read post