Nexus AI is Live! Turn Cyber Threats Data into Actionable Visuals with AI Precision. Built for CISOs.
Explore Nexus
Resources

Threat Intelligence

Discover how threat intelligence can help safeguard your organization's digital assets. Stay ahead of cyber threats with actionable insights.
CloudSEK’s XVigil has observed a spike in exposed Postman instances. This trend is especially concerning because Postman is used by 500,000 organizations and 20 million developers across the world.
November 30, 2022
CloudSEK’s contextual AI digital risk platform XVigil discovered a tweet by the threat group “Khalifah Cyber Crew” announcing a new campaign “OpsBantaiKaw2” for targeting Indian websites.
December 1, 2022
CloudSEK’s contextual AI digital risk platform XVigil, discovered a threat actor group named Team Mysterious Bangladesh who claimed to have compromised the CBHE Delhi, India. The group mentioned leaking information about students from 2004 to 2022.
December 5, 2022
CloudSEK’s contextual AI digital risk platform XVigil uncovered a phishing campaign that hosted a total of 8 subdomains impersonating the webpages of a popular Indian bank.
December 8, 2022
CloudSEK’s contextual AI digital risk platform XVigil has spotted an advertisement where a short tutorial is provided on how the Hayya Card registration facility could be misused by threat actors to create multiple copies of the card.
December 14, 2022
CloudSEK’s contextual AI digital risk platform XVigil uncovered a phishing campaign abusing a SaaS platform, named FormSubmit, to impersonate a popular Indian bank.
December 14, 2022
Critical RCE vulnerability affecting Citrix ADC and Citrix Gateway. APT 5 has been observed exploiting this vulnerability in the wild as per Citrix and NSA. Threat actors on the cybercrime forums were looking to buy the exploits for this vulnerability to perform arbitrary code execution.
December 23, 2022
CloudSEK’s Threat Research team conducted an investigation to understand the technical details of CVE-2022-44877, and the internet-wide exploitation of CentOS Web Panel 7 installations.
January 12, 2023

Download BeVigil App

Access to Underground Intelligence, Blog and Threat intelligence articles on your mobile as soon as it is published.

Google Play button to download App
Download CloudSEK BeVigil App
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
A newsletter that is upto date

Subscribe to our newsletter

Subscribe to the latest industry news, threats and resources.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
We Respect your privacy. Read our friendly privacy policy.

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.