Instagram
Twitter
Featured
The Scanner Was the Weapon: 36 Months of Precision Supply Chain Attacks Against DevSecOps Infrastructure
Latest in
Research Reports
CloudSEK: Global Threat Landscape Report 2025
CloudSEK: Threat Landscape Report for Middle East 2025
Latest in
Blog
Case Study: Uncovering a Critical Vulnerability in a Life Insurance App That Compromised User Privacy Through Exposed Sensitive Data and Live Activity
Shadow Banking in Your Pocket: Exposing Android App Used by Money Mules
Chinese APT Tactics and accesses uncovered after analyzing the I-SOON repository
Inaccurate Reporting Regarding RBI Data Breach: CyberExpress by Cyble Erroneously Links Rural Business Incubator (RBI) to Reserve Bank of India and Issues public Advisory
Case Study: HRMS Provider's Credential Leak Exposes Bank's Employee Data and Enables Account Takeover
Previous
Next
No items found.
Latest in
Threat Intelligence
Zimbra Collaboration Suite Actively Exploited Via an Authentication Bypass Vulnerability CVE-2022-37042
Prynt Stealer Source Code Shared over Cybercrime Forum
Sensitive Documents Leaked from an Indonesian Telecom Firm & Its Subsidiaries
Data of 43 US Firms Compromised via Access to Acronis Direct Storage Portal
Over 2B Records Compromised from WeChat & TikTok Via a Compromised Alibaba Storage Instance
Previous
Next
Resources
CloudSEK Blog
Threat Intelligence
White papers and Reports
No items found.