Resources

Blogs

Read insightful articles on cybersecurity, threat intelligence, and risk management on the CloudSEK Blog. Stay ahead of cyber threats and protect your organization.
Threat Actors Abuse AI-Generated Youtube Videos to Spread Stealer Malware

Threat Actors Abuse AI-Generated Youtube Videos to Spread Stealer Malware

Since November 2022 there has been a 200-300% month-on-month increase in Youtube videos containing links to stealer malware such as Vidar, RedLine, and Raccoon in their descriptions. The videos lure users by pretending to be tutorials on how to download cracked versions of software such as Photoshop, Premiere Pro, Autodesk 3ds Max, AutoCAD, and other products that are licensed products available only to paid users.
Read post
Recordbreaker: The Resurgence of Raccoon

Recordbreaker: The Resurgence of Raccoon

Recordbreaker: The Resurgence of Raccoon
Read post
Technical Analysis of MedusaLocker Ransomware

Technical Analysis of MedusaLocker Ransomware

Technical Analysis of MedusaLocker Ransomware
Read post
Combating data breaches caused by misconfigured apps

Combating data breaches caused by misconfigured apps

Combating data breaches caused by misconfigured apps
Read post
Threat actors’ next big target: VIPs, Executives, and Board members

Threat actors’ next big target: VIPs, Executives, and Board members

Threat actors’ next big target: VIPs, Executives, and Board members
Read post
Avoid costly breaches by upgrading your third-party vendor risk management 

Avoid costly breaches by upgrading your third-party vendor risk management 

Avoid costly breaches by upgrading your third-party vendor risk management 
Read post
How to bypass CAPTCHAs easily using Python and other methods

How to bypass CAPTCHAs easily using Python and other methods

How to bypass CAPTCHAs easily using Python and other methods
Read post
6 major quality metrics that will optimize your web app

6 major quality metrics that will optimize your web app

6 major quality metrics that will optimize your web app
Read post
What is shadow IT and how do you manage shadow IT risks associated with remote work?

What is shadow IT and how do you manage shadow IT risks associated with remote work?

What is shadow IT and how do you manage shadow IT risks associated with remote work?
Read post

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.