CloudSEK Logo
  • Instagram
  • Twitter
Featured
Beyond the Breach: Cutting Through Noise to Focus on Real Threats

Beyond the Breach: Cutting Through Noise to Focus on Real Threats

Latest in Research Reports

Notes of Deception: Exposing India’s Social Media-Based Counterfeit Currency Network

Uncovering Chinese Dark Web Syndicates and Money Mule Pipeline to Indian Banks

Latest in Blog

Byte Bandits: How Fake PDF Converters Are Stealing More Than Just Your Documents

How a Misconfiguration Led to Leaked Customer Data and Security Credentials

Protecting Your Brand in the Digital Age: Fake Pages & Channels Monitoring by CloudSEK’s XVigil

USD 110M Loan Portfolio at Risk Due to Vendor’s Apache Superset Insecure Default Initialization of Resource Vulnerability [CVE-2023-27524]

How an Exposed Jenkins Instance Led to a Full-Scale Infrastructure Compromise

Previous
Next
No items found.

Latest in Threat Intelligence

Web Shell Access to UAE Based Cloud & IT Service Provider, Bamboozle

Zimbra Collaboration Suite Actively Exploited Via an Authentication Bypass Vulnerability CVE-2022-37042

Prynt Stealer Source Code Shared over Cybercrime Forum

Sensitive Documents Leaked from an Indonesian Telecom Firm & Its Subsidiaries

Data of 43 US Firms Compromised via Access to Acronis Direct Storage Portal

Previous
Next

Resources

CloudSEK Blog

Threat Intelligence

White papers and Reports

No items found.