CloudSEK Logo
  • Instagram
  • Twitter
Featured
Beyond the Breach: Cutting Through Noise to Focus on Real Threats

Beyond the Breach: Cutting Through Noise to Focus on Real Threats

Latest in Research Reports

Uncovering Chinese Dark Web Syndicates and Money Mule Pipeline to Indian Banks

Quarterly IAV Roundup: Initial Access & Database Brokers

Latest in Blog

Inside the Security Gaps of a Digital Lending Firm—And What You Can Learn

How a Leading Fintech Firm Was Exposed by Simple Security Oversights

Inside the BWSSB Incident : How An Exposed Environment File Enabled the Sale of 290K+ Applicant Records and Database Root Access

How a Single SQL Injection Exposed 45 Databases, 240 S3 Buckets and Entire Cloud Infrastructure

Unprotected API Leaks Confidential Data of 33,000 Employee Records—BeVigil Raises the Alarm

Previous
Next
No items found.

Latest in Threat Intelligence

A Comprehensive Analysis of the Zimbra Vulnerability CVE-2022-30333

SolidBit Ransomware Group Actively Recruiting Affiliates

Raven Storm, the Multi-Threading Tool Employed by Hacktivists for DDoS Attacks

Scammers Impersonate Electricity Board Officials to Gain Device Access & Exfiltrate Funds

Zoho Form Service Leveraged to Exfiltrate Sensitive PII from Banking Customers

Previous
Next

Resources

CloudSEK Blog

Threat Intelligence

White papers and Reports

No items found.