Nexus AI is Live! Turn Cyber Threats Data into Actionable Visuals with AI Precision. Built for CISOs.
Explore Nexus
Resources

Threat Intelligence

Discover how threat intelligence can help safeguard your organization's digital assets. Stay ahead of cyber threats with actionable insights.
Goodwill ransomware group propagates very unusual demands in exchange for the decryption key. The Robin Hood-like group is forcing its Victims to donate to the poor and provides financial assistance to the patients in need.
May 24, 2022
We discovered that Gimmick MacOS malware communicates only through their C2 server hosted on Google Drive. The malware was discovered in the first week of May and it has been actively targeting macOS devices
May 26, 2022
CloudSEK’s contextual AI digital risk platform XVigil discovered an unprecedented, sophisticated phishing technique, commonly known as Browser-in-the-Browser (BitB) attack, that has been targeting government websites across the world, including India.
June 3, 2022
CloudSEK’s Threat Research team has analyzed the MS Office RCE 0day vulnerability that has been dubbed as Follina and has been given the CVE-2022-30190. The attack vector and the vulnerability very closely resembles CVE-2021-40444.
June 3, 2022
Category: Adversary Intelligence Threat Type: Hacktivism Industry: Government & Private Region: India Update 2: 13 June 2022, 18:30 IST CloudSEK’s researchers captured a member of the DragonForce forum executing the purported DDOS attack on the BJP official website. The IP address in the image matches the BJP’s server’s IP address (ie.104[.]18[.]130[.]37). In […]
June 13, 2022
XVigil discovered a threat actor advertising a “battle-tested” reverse proxy/PHP phishing app called “NakedPages”, on a cybercrime forum.
June 13, 2022
XVigil identified a post, advertising 170 SonicVPN accesses for USD 2,000. Threat actors have been targeting SonicVPN frequently, which puts these accesses at a high risk of being exploited.
June 13, 2022
CVE-2022-26314 is an unauthenticated and remote OGNL injection vulnerability that could lead to remote code execution.
June 13, 2022

Download BeVigil App

Access to Underground Intelligence, Blog and Threat intelligence articles on your mobile as soon as it is published.

Google Play button to download App
Download CloudSEK BeVigil App
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
A newsletter that is upto date

Subscribe to our newsletter

Subscribe to the latest industry news, threats and resources.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
We Respect your privacy. Read our friendly privacy policy.

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.