Blog

Research entries on relevant and emerging
cyber attacks, security vulnerabilities and exploits,
concepts and techniques involved in designing, and so on.

Featured Article

  • All
  • Infrastructure
  • Research
  • STIX
  • Threat Intelligence

Hackers target large organizations to trick their employees and steal sensitive data. What are phishing attacks and how to prevent them?

Zero-days are software vulnerabilities that are not known to the developers. Here’s a list of the most popular zero-day attacks.

Defining and explaining the role of a product manager in startups by introducing the 4 Ps of product management.

CloudSEK has done a detailed analysis of the Juspay data leak that affects user records and has summarized their key findings in this blog.

In the event of full scale cyberattack the pharmaceutical sector could incur huge loss. We review the attacks that hit major pharmaceuticals.

Third-party applications may thus seem innocent, but could in fact be nefarious and have grave implications on its users. We explain how.

We explore the process of Malware Analysis and Reverse Engineering (MA&RE) by analysing Magecart’s skimming malware.

We discuss the open source logging solution ELK Stack, why it is a popular choice among developers, its configuration, and functionalities.

Prometheus is an open-source monitoring software designed to monitor containerized applications in a microservice architecture.

Using STIX feeds with TAXII enables organizations to exchange cyber threat intelligence in a more structured and standardized manner.