Instagram
Twitter
Featured
The Scanner Was the Weapon: 36 Months of Precision Supply Chain Attacks Against DevSecOps Infrastructure
Latest in
Research Reports
CloudSEK: Global Threat Landscape Report 2025
CloudSEK: Threat Landscape Report for Middle East 2025
Latest in
Blog
Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine
In-depth Technical Analysis of Colibri Loader Malware
Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass
[Update]Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft, Okta, and Globant
Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group
Previous
Next
No items found.
Latest in
Threat Intelligence
Fappy Ransomware Threat Intel Advisory
200K CAT 2019 test takers’ PII database leaked online
Conti Ransomware Threat Intel Advisory
100K Santander Mexico client records for sale on data sharing forum
Critical Zerologon Vulnerability Threat Intel Advisory
Previous
Next
Resources
CloudSEKÂ Blog
Threat Intelligence
White papers and Reports
No items found.