Instagram
Twitter
Featured
The Scanner Was the Weapon: 36 Months of Precision Supply Chain Attacks Against DevSecOps Infrastructure
Latest in
Research Reports
CloudSEK: Global Threat Landscape Report 2025
CloudSEK: Threat Landscape Report for Middle East 2025
Latest in
Blog
Technical Analysis of Files Used in 3CX Desktop App Malware Campaign
Ongoing Active Trojanized 3CX Desktop App Potentially Affecting 600K Users Globally
How Threat Actors are Exploiting ChatGPT's Popularity to Spread Malware via Compromised Facebook Accounts Putting Over 500,000 People at Risk
Threat Actors Abuse AI-Generated Youtube Videos to Spread Stealer Malware
Recordbreaker: The Resurgence of Raccoon
Previous
Next
No items found.
Latest in
Threat Intelligence
Private Drainer for MetaMask Crypto Wallets
Exploit for CVE-2022-26809, an RCE Vulnerability in Windows RPC
CVE-2022-40684: Critical Authentication Bypass Vulnerability in Fortinet Products
Phishing Campaign Targeting the Saudi Government Service Portal, Absher
Team Mysterious Bangladesh planning another tide of attack over Indian entities
Previous
Next
Resources
CloudSEK Blog
Threat Intelligence
White papers and Reports
No items found.