Research entries on relevant and emerging
cyber attacks, security vulnerabilities and exploits,
concepts and techniques involved in designing, and so on.
- Threat Intelligence
CloudSEK has done a detailed analysis of the Juspay data leak that affects user records and has summarized their key findings in this blog.
We explore the process of Malware Analysis and Reverse Engineering (MA&RE) by analysing Magecart’s skimming malware.
Prometheus is an open-source monitoring software designed to monitor containerized applications in a microservice architecture.
Using STIX feeds with TAXII enables organizations to exchange cyber threat intelligence in a more structured and standardized manner.