Instagram
Twitter
Featured
The Scanner Was the Weapon: 36 Months of Precision Supply Chain Attacks Against DevSecOps Infrastructure
Latest in
Research Reports
CloudSEK: Global Threat Landscape Report 2025
CloudSEK: Threat Landscape Report for Middle East 2025
Latest in
Blog
AI, the Iran-US Conflict, and the Threat to US Critical Infrastructure
A Threat Actor Landscape Assessment of ICS/OT Targeting in the 2026 Iran-US Conflict AND THE SCALE OF THE RISK
RedAlert Trojan Campaign: Fake Emergency Alert App Spread via SMS Spoofing Israeli Home Front Command
Situation Report: Middle East Escalation (February 27–1st March, 2026)
Inside Gunra RaaS: From Affiliate Recruitment on the Dark Web to Full Technical Dissection of their Locker
Previous
Next
No items found.
Latest in
Threat Intelligence
Active Targets for ProxyLogon Vulnerability Shared on Cybercrime Forum
30 Million Records from Alleged T-Mobile Breach for Sale
Over 21 Million User Records from Microsoft for Sale on Cybercrime Forum
Microsoft MSHTML Remote Code Execution Vulnerability Threat Intel Advisory
Python-based Slycer Ransomware as a Service for Sale on Cybercrime Forum
Previous
Next
Resources
CloudSEK Blog
Threat Intelligence
White papers and Reports
No items found.