Our Blog

Read our latest blog posts

Cyber Security Incident at CloudSEK

GMT 4.30 PM Dec 6th. We are investigating a targeted cyber attack on CloudSEK. An employee’s Jira...

Continue reading

Technical Analysis of the Eternity Stealer

The Eternity Stealer is written in C# and is capable of stealing data from various well-known applications....

Continue reading

Technical Analysis of the RedLine Stealer

Author: Anandeshwar Unnikrishnan Editor: Suchita Katira Summary RedLine is an information stealer which operates on a MaaS...

Continue reading

Switching to Monorepo Architecture

Author: Rohan Luthra Editor: Benila Susan Jacob An Obstacle We started a new project a year ago...

Continue reading

Hackers Can Target Mailchimp Users By Exploiting a Dependency Confusion Bug

Author : Vishal Singh Co-Authors and Contributors: Godson Bastin Editor : Deepanjli Paulraj BeVigil, the world’s first...

Continue reading

Technical Analysis of BlueSky Ransomware

BlueSky Ransomware is a modern malware using advanced techniques to evade security defences. It predominantly targets Windows...

Continue reading

Appsmith Patches Full-Read SSRF Vulnerabilities Reported by CloudSEK

CloudSEK ASM discovered post-authentication full read SSRF (Server-side request forgery) vulnerabilities in Appsmith’s REST Client (CVE-2022-38298) and...

Continue reading

Technical Analysis of MedusaLocker Ransomware

MedusaLocker is a ransomware family that appeared in September 2019 and was employed rapidly for attacks on...

Continue reading

Recordbreaker: The Resurgence of Raccoon

Researcher: Anandeshwar Unnikrishnan Editors: Suchita Katira & Hansika Saxena An info stealer is malicious software (malware) that...

Continue reading

How Threat Actors are Exploiting Android Webview

What is a WebView WebView is a simple but powerful way to present web-based content in Android....

Continue reading