Instagram
Twitter
Featured
Inside Gunra RaaS: From Affiliate Recruitment on the Dark Web to Full Technical Dissection of their Locker
Latest in
Research Reports
CloudSEK: Threat Landscape Report for Middle East 2025
ForgeCraft: Unmasking a China-Linked Operation Selling Counterfeit IDs Across North America
Latest in
Blog
Beyond the Scanner: How Phishers Outsmart Traditional Detection Mechanisms
YouTube Creators Under Siege Again: Clickflix Technique Fuels Malware Attacks
Part 2: Validating the Breach Oracle Cloud Denied – CloudSEK’s Follow-Up Analysis
The Biggest Supply Chain Hack Of 2025: 6M Records Exfiltrated from Oracle Cloud affecting over 140k Tenants
Unmasking Hidden Threats: How BeVigil Secures Apache ActiveMQ from Cyber Risks
Previous
Next
No items found.
Latest in
Threat Intelligence
Unauthenticated Confluence RCE Vulnerability (CVE-2022-26134) Actively Exploited in the Wild
CoinEgg Scam Campaign Steals Victims’ Cryptocurrency and Data
Indian Rail Coach Factory PII and Credentials Shared From Past Data Breaches
Overlooked Webhooks Exploit Endpoint Vulnerability in Slack Channels
Improvised Modus Operandi for Targeting Indian Banking Customers via SMS Forwarding Malware
Previous
Next
Resources
CloudSEK Blog
Threat Intelligence
White papers and Reports
No items found.