CloudSEK Logo
  • Instagram
  • Twitter
Featured
Beyond the Breach: Cutting Through Noise to Focus on Real Threats

Beyond the Breach: Cutting Through Noise to Focus on Real Threats

Latest in Research Reports

Notes of Deception: Exposing India’s Social Media-Based Counterfeit Currency Network

Uncovering Chinese Dark Web Syndicates and Money Mule Pipeline to Indian Banks

Latest in Blog

Inside the Security Gaps of a Digital Lending Firm—And What You Can Learn

How a Leading Fintech Firm Was Exposed by Simple Security Oversights

Inside the BWSSB Incident : How An Exposed Environment File Enabled the Sale of 290K+ Applicant Records and Database Root Access

How a Single SQL Injection Exposed 45 Databases, 240 S3 Buckets and Entire Cloud Infrastructure

Unprotected API Leaks Confidential Data of 33,000 Employee Records—BeVigil Raises the Alarm

Previous
Next
No items found.

Latest in Threat Intelligence

Over 2B Records Compromised from WeChat & TikTok Via a Compromised Alibaba Storage Instance

RansomHouse group has allegedly breached IPCA Laboratories

Online Kerala Lottery - An Investigation into the Impersonation Scam

Advisory on CVE-2022-42889, Named “Text4Shell”

Caffeine: the Phishing-as-a-Service Platform Targeting Russian & Chinese Entities

Previous
Next

Resources

CloudSEK Blog

Threat Intelligence

White papers and Reports

No items found.