Instagram
Twitter
Featured
Part 2: The Iran-Israel Cyber Standoff - The State's Silent War
Latest in
Research Reports
Quarterly IAV Roundup: Initial Access & Database Brokers
India To Lose ₹20,000 Crore To Cybercrime in 2025
Latest in
Blog
Inside the BWSSB Incident : How An Exposed Environment File Enabled the Sale of 290K+ Applicant Records and Database Root Access
How a Single SQL Injection Exposed 45 Databases, 240 S3 Buckets and Entire Cloud Infrastructure
Unprotected API Leaks Confidential Data of 33,000 Employee Records—BeVigil Raises the Alarm
Byte Bandits: How Fake PDF Converters Are Stealing More Than Just Your Documents
How a Misconfiguration Led to Leaked Customer Data and Security Credentials
Previous
Next
No items found.
Latest in
Threat Intelligence
Cybercriminals Exploit Reverse Tunnel Services and URL Shorteners to Launch Large-Scale Phishing Campaigns
Hacktivist Group DragonForce Malaysia Releases Windows LPE Exploit, Discloses Plans to Evolve into a Ransomware Group
Threat Actors Use Exposed Swagger UI to Misuse a Company’s Endpoints and Target Customers
Threat Actor Claiming to have Compromised IBM & Stanford University Disclose Their TTPs
Advanced Phishing Scams Target Individuals & Businesses in the Middle East
Previous
Next
Resources
CloudSEK Blog
Threat Intelligence
White papers and Reports
No items found.