Instagram
Twitter
Featured
The Scanner Was the Weapon: 36 Months of Precision Supply Chain Attacks Against DevSecOps Infrastructure
Latest in
Research Reports
CloudSEK: Global Threat Landscape Report 2025
CloudSEK: Threat Landscape Report for Middle East 2025
Latest in
Blog
MacSync Stealer: SEO Poisoning and ClickFix-Based macOS Malware Delivery Chain
Opportunistic threat actors using Ramadan coupon as a lure to target retail store customers in Middle East
Weaponizing LSPosed: Remote SMS Injection and Identity Spoofing in Modern Payment Ecosystems
Southeast Asia Region-specific Iran-israel war Threat Intelligence
Weaponizing LSPosed: Remote SMS Injection and Identity Spoofing in Modern Payment Ecosystems
Previous
Next
No items found.
Latest in
Threat Intelligence
Zimbra Collaboration Suite Actively Exploited Via an Authentication Bypass Vulnerability CVE-2022-37042
Prynt Stealer Source Code Shared over Cybercrime Forum
Sensitive Documents Leaked from an Indonesian Telecom Firm & Its Subsidiaries
Data of 43 US Firms Compromised via Access to Acronis Direct Storage Portal
Over 2B Records Compromised from WeChat & TikTok Via a Compromised Alibaba Storage Instance
Previous
Next
Resources
CloudSEK Blog
Threat Intelligence
White papers and Reports
No items found.