Stay ahead of threats with our in-depth research on malware, ransomware, and emerging vulnerabilities. Equip your organization with the latest insights and tools to safeguard your digital landscape
XVigil’s Underground Intelligence module records and reports the ongoing criminal activity from various underground forums. The data collected in 2021 and 2022 contained some very interesting patterns in the activity of threat actors. CloudSEK’s TRIAD was able to identify the following drastic changes in the recorded patterns.
Algolia's API is used by companies to incorporate search, discovery, and recommendations into their voice, mobile, and website applications. It is currently used by over 11,000 companies, including Lacoste, Stripe, Slack, Medium, and Zendesk to manage ~1.5 trillion search queries a year.
CloudSEK’s Attack Surface Monitoring Platform, uncovered 3207 apps, leaking Twitter API keys, that can be utilized to gain access to or to take over Twitter accounts.
In this report, we delve into how threat actors use reverse tunnel services, along with URL shorteners, to orchestrate widespread campaigns, without leaving any traces.
In this report, we have provided an overview of the major trends* observed in the global threat landscape in the last quarter of 2022 and their correspondence with the trends in 2021.