Our Blog

Read our latest blog posts

The Shang-Chi Malware Campaign: Is your pirated copy of the summer...

A recent campaign is spreading malware embedded in pirated copies of popular summer blockbusters like Shang-Chi and...

Continue reading

How Does k3d Knock Other Kubernetes Clusters Off Their Pedestals?

Learn more about the simple yet sophisticated k3d cluster that enhances the effectiveness of Kubernetes, the de...

Continue reading

The Unabated Reign of ATM Hacking: The 2021 Rajasthan ATM Attack...

Here are the specifics of the numerous physical and electronic attack vectors used by ATM hackers, highlighting...

Continue reading

Home Ministry Proposes Ban on VPN Services: Should You Be Worried?

How would a total ban of VPN services in India affect you? This article delves into the...

Continue reading

Disgruntled Affiliate Reveals Conti Ransomware Attack Techniques

The group has actively targeted the healthcare industry and first responder networks when COVID was at its...

Continue reading

CloudSEK’s Selenium Grid Architecture and Data Acquisition

We discuss the various components of a complex Selenium Grid architecture to help readers understand how singular...

Continue reading

Everything You Need to Know about the Pegasus Spyware

On 18 July 2021, The Pegasus Project reported that they obtained over 50,000 phone numbers of potential...

Continue reading

Kaseya VSA Supply Chain Ransomware Incident

On 02 July 2021, Kaseya disclosed that they were the victim of a large-scale ransomware attack. Here...

Continue reading

XVigil’s Fake Domain Finder: A Deep-dive on the Acquisition Component and...

Here's how XVigil's Fake Domain Finder framework uses the Acquisition component and crawlers to identify fake domains...

Continue reading

Domino’s Breach and the Nucleus ransomware attack: More than just isolated...

We are investigating the possible attack vectors that could have led to the compromise of Domino’s Breach...

Continue reading