Instagram
Twitter
Featured
Threat Actors Impersonate Microsoft Teams To Deliver Odyssey macOS Stealer Via Clickfix
Latest in
Research Reports
ForgeCraft: Unmasking a China-Linked Operation Selling Counterfeit IDs Across North America
The Anatomy of an Attack: Pakistan Based Infostealer Delivery Network Exposed
Latest in
Blog
Byte Bandits: How Fake PDF Converters Are Stealing More Than Just Your Documents
How a Misconfiguration Led to Leaked Customer Data and Security Credentials
Protecting Your Brand in the Digital Age: Fake Pages & Channels Monitoring by CloudSEK’s XVigil
USD 110M Loan Portfolio at Risk Due to Vendor’s Apache Superset Insecure Default Initialization of Resource Vulnerability [CVE-2023-27524]
How an Exposed Jenkins Instance Led to a Full-Scale Infrastructure Compromise
Previous
Next
No items found.
Latest in
Threat Intelligence
Akira Ransomware: What You Need to Know
Cowin data leak claim and CloudSEK analysis
Supply Chain Attack Infiltrates Android Apps with Malicious SDK
Exposed: The PowerExchange Backdoor Vulnerability in Microsoft Exchange Servers
Anonymous Sudan Claims Successful Takedown of First Abu Dhabi Bank Website & Application Via DDoS Attacks
Previous
Next
Resources
CloudSEK Blog
Threat Intelligence
White papers and Reports
No items found.