Tag: Research

Read our latest blog posts

Disgruntled Affiliate Reveals Conti Ransomware Attack Techniques

The group has actively targeted the healthcare industry and first responder networks when COVID was at its...

Continue reading

CloudSEK’s Selenium Grid Architecture and Data Acquisition

We discuss the various components of a complex Selenium Grid architecture to help readers understand how singular...

Continue reading

Everything You Need to Know about the Pegasus Spyware

On 18 July 2021, The Pegasus Project reported that they obtained over 50,000 phone numbers of potential...

Continue reading

XVigil’s Fake Domain Finder: A Deep-dive on the Acquisition Component and...

Here's how XVigil's Fake Domain Finder framework uses the Acquisition component and crawlers to identify fake domains...

Continue reading

Domino’s Breach and the Nucleus ransomware attack: More than just isolated...

We are investigating the possible attack vectors that could have led to the compromise of Domino’s Breach...

Continue reading

Helm: Paving the Way to Environment Aware Deployments

Creating and managing multiple deployments and sets of config. files can be a cumbersome task. But with...

Continue reading

How to Progressively Migrate to Redux Toolkit

Redux toolkit works with fewer lines of boilerplate codes, simplified code logic, and it boosts performance. How...

Continue reading

Juspay Databases Containing 10 Crore Users’ Data for Sale on Data...

CloudSEK has done a detailed analysis of the Juspay data leak that affects user records and has...

Continue reading

Malware Analysis and Reverse Engineering: Analysing Magecart Skimmer

We explore the process of Malware Analysis and Reverse Engineering (MA&RE) by analysing Magecart’s skimming malware.

Continue reading

Centralized Log Management with ELK Stack

We discuss the open source logging solution ELK Stack, why it is a popular choice among developers,...

Continue reading