External Digital Risk Protection
Software and Supply chain Risk Monitoring and Protection
Cyber Threats Monitoring
Dark web monitoring
Brand Threats Monitoring
The latest industry news, updates and info.
Get up and running on new threat reports and techniques.
Whitepapers & Reports
The content team broke their backs making these reports.
Learn how our customers are making big changes. You have got good company!
We are more connected than you know. Explore all Integrations
100s of partners and one Shared goal; Secure future for all us.
Learn about our story and our mission statement.
Life at CloudSEK
A sneak peek at the awesome life at CloudSEK.
We are in love with undeniable talent. Join our team!
All the boring but necessary legalese that legal made us add.
Threat Actors Abuse AI-Generated Youtube Videos to Spread Stealer Malware
All Blog Posts
Whitepapers & Reports
Threat Actors Abuse Popular SaaS Products in Phishing Campaigns Targeting BFSI Customers
Read the Report now!
Schedule a Demo
Subscribe to learn about new product features, the latest in technology and updates.
July 15, 2022
Philippines Government and Civil Service Commission Data Exposed in May 2022
July 7, 2022
YourCyanide: An Investigation into ‘The Frankenstein’ Ransomware that Sends Malware Laced Love Letters
June 3, 2022
Analysis and Attribution of the Eternity Ransomware: Timeline and Emergence of the Eternity Group
May 12, 2022
Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group
April 4, 2022
[Update]Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft, Okta, and Globant
March 27, 2022
Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass
March 10, 2022
In-depth Technical Analysis of Colibri Loader Malware
March 2, 2022
Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine
February 17, 2022
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2)
January 7, 2022
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)
December 17, 2021
Cryptocurrency: An Emerging Target for Cyberattacks
December 2, 2021
Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 2/2)
December 1, 2021
Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 1/2)
November 3, 2021
Advanced Automated Social Engineering Bots: The High Tide of Social Engineering Bots and the Scammers Riding Them
October 12, 2021
The Shang-Chi Malware Campaign: Is your pirated copy of the summer blockbuster laced with a RAT?
October 1, 2021
How Does k3d Knock Other Kubernetes Clusters Off Their Pedestals?
September 23, 2021
The Unabated Reign of ATM Hacking: The 2021 Rajasthan ATM Attack and the Proliferation of Novel ATM Hacking Tools and Techniques
September 15, 2021
Home Ministry Proposes Ban on VPN Services: Should You Be Worried?
August 7, 2021
Disgruntled Affiliate Reveals Conti Ransomware Attack Techniques
August 4, 2021
CloudSEK’s Selenium Grid Architecture and Data Acquisition
Join 10,000+ subscribers
Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.