CloudSEK Logo
  • Instagram
  • Twitter
Featured
Beyond the Breach: Cutting Through Noise to Focus on Real Threats

Beyond the Breach: Cutting Through Noise to Focus on Real Threats

Latest in Research Reports

Uncovering Chinese Dark Web Syndicates and Money Mule Pipeline to Indian Banks

Quarterly IAV Roundup: Initial Access & Database Brokers

Latest in Blog

Inside the Security Gaps of a Digital Lending Firm—And What You Can Learn

How a Leading Fintech Firm Was Exposed by Simple Security Oversights

Inside the BWSSB Incident : How An Exposed Environment File Enabled the Sale of 290K+ Applicant Records and Database Root Access

How a Single SQL Injection Exposed 45 Databases, 240 S3 Buckets and Entire Cloud Infrastructure

Unprotected API Leaks Confidential Data of 33,000 Employee Records—BeVigil Raises the Alarm

Previous
Next
No items found.

Latest in Threat Intelligence

Web Shell Access to UAE Based Cloud & IT Service Provider, Bamboozle

Zimbra Collaboration Suite Actively Exploited Via an Authentication Bypass Vulnerability CVE-2022-37042

Prynt Stealer Source Code Shared over Cybercrime Forum

Sensitive Documents Leaked from an Indonesian Telecom Firm & Its Subsidiaries

Data of 43 US Firms Compromised via Access to Acronis Direct Storage Portal

Previous
Next

Resources

CloudSEK Blog

Threat Intelligence

White papers and Reports

No items found.