CloudSEK Logo
  • Instagram
  • Twitter
Featured
The Scanner Was the Weapon: 36 Months of Precision Supply Chain Attacks Against DevSecOps Infrastructure

The Scanner Was the Weapon: 36 Months of Precision Supply Chain Attacks Against DevSecOps Infrastructure

Latest in Research Reports

CloudSEK: Global Threat Landscape Report 2025

CloudSEK: Threat Landscape Report for Middle East 2025

Latest in Blog

Racing Into Danger: Advanced Cyber Threats Targeting Formula 1 Fans and Teams Ahead of the Dutch Grand Prix

Ganesh Chaturthi Online Scams: How Cybercriminals Exploit Festive Offers

The Price of Trust: Analyzing the Malware Campaign Exploiting TASPEN's Legacy to Target Indonesian Senior Citizens

Trusted My Summarizer, Now My Fridge Is Encrypted — How Threat Actors Could Weaponize AI Summarizers with CSS-Based ClickFix Attacks

The Ghost in the Machine: The Complete Dossier on TA-NATALSTATUS and the Cryptojacking Turf War

Previous
Next
No items found.

Latest in Threat Intelligence

Cybercriminals Exploit Reverse Tunnel Services and URL Shorteners to Launch Large-Scale Phishing Campaigns

Hacktivist Group DragonForce Malaysia Releases Windows LPE Exploit, Discloses Plans to Evolve into a Ransomware Group

Threat Actors Use Exposed Swagger UI to Misuse a Company’s Endpoints and Target Customers

Threat Actor Claiming to have Compromised IBM & Stanford University Disclose Their TTPs

Advanced Phishing Scams Target Individuals & Businesses in the Middle East

Previous
Next

Resources

CloudSEK Blog

Threat Intelligence

White papers and Reports

No items found.