Home
Product
CloudSEK XVigil
External Digital Risk Protection
CloudSEK SVigil
Software and Supply chain Risk Monitoring and Protection
CloudSEK BeVigil
Community
Application Scanner
Solutions
Cyber Threats Monitoring
Dark web monitoring
Brand Threats Monitoring
Infrastructure Monitoring
Resources
Resources
Blog
The latest industry news, updates and info.
Threat Intelligence
Get up and running on new threat reports and techniques.
Whitepapers & Reports
The content team broke their backs making these reports.
Customer stories
Learn how our customers are making big changes. You have got good company!
Company
Integrations
We are more connected than you know. Explore all Integrations
Partners
100s of partners and one Shared goal; Secure future for all us.
About us
Learn about our story and our mission statement.
Life at CloudSEK
A sneak peek at the awesome life at CloudSEK.
Careers
We're hiring!
We are in love with undeniable talent. Join our team!
Legal
All the boring but necessary legalese that legal made us add.
Resources
Blog Posts
Threat Actors Abuse AI-Generated Youtube Videos to Spread Stealer Malware
Read Now
All Blog Posts
Whitepapers & Reports
Threat Actors Abuse Popular SaaS Products in Phishing Campaigns Targeting BFSI Customers
Read the Report now!
All Reports
Log in
Schedule a Demo
Resources
Blog Posts
Subscribe to learn about new product features, the latest in technology and updates.
July 15, 2022
min read
Philippines Government and Civil Service Commission Data Exposed in May 2022
July 7, 2022
min read
YourCyanide: An Investigation into ‘The Frankenstein’ Ransomware that Sends Malware Laced Love Letters
June 3, 2022
min read
Analysis and Attribution of the Eternity Ransomware: Timeline and Emergence of the Eternity Group
May 12, 2022
min read
Technical Analysis of Emerging, Sophisticated Pandora Ransomware Group
April 4, 2022
min read
[Update]Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft, Okta, and Globant
March 27, 2022
min read
Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass
March 10, 2022
min read
In-depth Technical Analysis of Colibri Loader Malware
March 2, 2022
min read
Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine
February 17, 2022
min read
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2)
January 7, 2022
min read
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)
December 17, 2021
min read
Cryptocurrency: An Emerging Target for Cyberattacks
December 2, 2021
min read
Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 2/2)
December 1, 2021
min read
Resurgence of DJVU/STOP Ransomware Strain in the Wild (Part 1/2)
November 3, 2021
min read
Advanced Automated Social Engineering Bots: The High Tide of Social Engineering Bots and the Scammers Riding Them
October 12, 2021
min read
The Shang-Chi Malware Campaign: Is your pirated copy of the summer blockbuster laced with a RAT?
October 1, 2021
min read
How Does k3d Knock Other Kubernetes Clusters Off Their Pedestals?
September 23, 2021
min read
The Unabated Reign of ATM Hacking: The 2021 Rajasthan ATM Attack and the Proliferation of Novel ATM Hacking Tools and Techniques
September 15, 2021
min read
Home Ministry Proposes Ban on VPN Services: Should You Be Worried?
August 7, 2021
min read
Disgruntled Affiliate Reveals Conti Ransomware Attack Techniques
August 4, 2021
min read
CloudSEK’s Selenium Grid Architecture and Data Acquisition
Previous
Next
Join 10,000+ subscribers
Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.