Instagram
Twitter
Featured
Inside Gunra RaaS: From Affiliate Recruitment on the Dark Web to Full Technical Dissection of their Locker
Latest in
Research Reports
CloudSEK: Threat Landscape Report for Middle East 2025
ForgeCraft: Unmasking a China-Linked Operation Selling Counterfeit IDs Across North America
Latest in
Blog
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2)
Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine
In-depth Technical Analysis of Colibri Loader Malware
Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass
[Update]Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft, Okta, and Globant
Previous
Next
No items found.
Latest in
Threat Intelligence
Zimbra Collaboration Suite Actively Exploited Via an Authentication Bypass Vulnerability CVE-2022-37042
Prynt Stealer Source Code Shared over Cybercrime Forum
Sensitive Documents Leaked from an Indonesian Telecom Firm & Its Subsidiaries
Data of 43 US Firms Compromised via Access to Acronis Direct Storage Portal
Over 2B Records Compromised from WeChat & TikTok Via a Compromised Alibaba Storage Instance
Previous
Next
Resources
CloudSEK Blog
Threat Intelligence
White papers and Reports
No items found.