🚀 CloudSEK has raised $19M Series B1 Round – Powering the Future of Predictive Cybersecurity
Read More
Resources

Threat Intelligence

Discover how threat intelligence can help safeguard your organization's digital assets. Stay ahead of cyber threats with actionable insights.
VenomRAT is a remote access tool discovered by 2020, and it is used by threat actors to control the infected systems remotely.
November 19, 2021
CloudSEK’s Threat Intelligence Research team analyzed the profile of the ransomware group named 54bb47h (Sabbath)
November 23, 2021
CloudSEK’s flagship digital risk monitoring platform XVigil discovered a post, on a Russian cybercrime forum frequented by Ransomware groups, regarding eight vulnerabilities targeting Samba packages affecting Active Directory domains.
November 23, 2021
Grafana recently released an advisory and patch for a critical path traversal vulnerability which leads to an unauthenticated Local File inclusion. This vulnerability affects Grafana versions v8.0.0-beta1 through v8.3.0, however, the Grafana Cloud remains unaffected.
December 9, 2021
The Log4Shell vulnerability, tracked as CVE-2021-4428, has the highest severity of CVSS 10, as it enables unauthenticated remote code execution and is already being exploited in the wild.
December 13, 2021
Recently, our research team discovered an interesting post, on a Russian-language cybercrime forum, of a threat actor advertising a phishing toolkit. In the actor’s first post related to the phishing service, they were only selling monthly subscription packages. However, through a reliable source, we have gathered other details about this phishing campaign, including the tactics, techniques, and procedures (TTPs) used.
December 22, 2021
Log4J vulnerability is now being exploited by notorious ransomware groups such as Khonsari and Conti. Log4Shell had 3 high priority security patches in the last week alone, leading to increased threat severity.
December 23, 2021
Our Research team analysed the profile of the ransomware group dubbed BlackCat. This group doesn’t have an online presence apart from an exclusive Onion site, where they post their activities, updates, and targeted victims.
January 7, 2022

Download BeVigil App

Access to Underground Intelligence, Blog and Threat intelligence articles on your mobile as soon as it is published.

Google Play button to download App
Download CloudSEK BeVigil App
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
A newsletter that is upto date

Subscribe to our newsletter

Subscribe to the latest industry news, threats and resources.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
We Respect your privacy. Read our friendly privacy policy.

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.