Resources

Threat Intelligence

Discover how threat intelligence can help safeguard your organization's digital assets. Stay ahead of cyber threats with actionable insights.
CloudSEK’s contextual AI digital risk platform XVigil discovered the threat actor group Anonymous Sudan claiming responsibility for disrupting the services of the First Abu Dhabi Bank website and application.
May 29, 2023
A hacker known as Tanaka has exposed over 320,000 patient records from ayush.jharkhand.gov.in, detailing personal and medical information. The 7.3 MB database leak includes sensitive data from the AYUSH ministry's site
September 4, 2023
Category: Adversary Intelligence Industry: Telecommunications Motivation: Financial Region: Indonesia Source*: F4 Executive Summary THREAT IMPACT MITIGATION Data breach affecting an Indonesian telecom firm, PT Telekomunikasi Indonesia, and its subsidiaries. Tax cards, financial statements, and sensitive government documents exposed. Leaked documents could reveal business practices and IP. Compromised financial records can be used for social engineering […]
November 3, 2022
CloudSEK team has identified a malicious actor promoting a Telegram bot that provided access to the personal information of Indian individuals who had reportedly registered for vaccines through the Cowin Portal. The bot claimed to offer personally identifiable information (PII) data.
June 12, 2023
CloudSEK threat intelligence advisory on Kobalos malware with a small yet complex codebase, targeting multiple operating systems.
March 5, 2021
CVE-2023-4197 Improper input validation in Dolibarr ERP CRM v18.0.1 fails to strip certain PHP code from user-supplied input when creating a Website, allowing an attacker to inject and evaluate arbitrary PHP code
November 6, 2023
Akira ransomware is a new and sophisticated threat that has been targeting organizations in recent months. The ransomware encrypts files on the victim's system and then demands a ransom payment in order to decrypt them
Corona Virus crypto tokens sold on the website, claims to provide financial relief to the victims of the pandemic.
April 3, 2020

Download BeVigil App

Access to Underground Intelligence, Blog and Threat intelligence articles on your mobile as soon as it is published.

Google Play button to download App
Download CloudSEK BeVigil App
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
A newsletter that is upto date

Subscribe to our newsletter

Subscribe to the latest industry news, threats and resources.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
We Respect your privacy. Read our friendly privacy policy.

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.