Category: Data leaks

Read our latest blog posts

Modern Underground Marketplaces and Digital Goods

How do modern underground marketplaces operate? What are digital goods and how have they played a major...

Continue reading

Digital Brand Protection: A Game-changing Strategy for Online Brand Reputation

Here are some reasons why you should replace your brand monitoring solutions with a digital brand protection...

Continue reading

Juspay Databases Containing 10 Crore Users’ Data for Sale on Data...

CloudSEK has done a detailed analysis of the Juspay data leak that affects user records and has...

Continue reading

Grappling with COVID-Themed Cyber Attacks: Pharmaceutical Sector

In the event of full scale cyberattack the pharmaceutical sector could incur huge loss. We review the...

Continue reading

The Evolution of the Data Leak Extortion Ecosystem

We explain the evolution of the data leak extortion ecosystem through the advancements made by ransomware groups...

Continue reading

How to build a secure AWS infrastructure

Summary of the recommendations of AWS' Well-Architected Framework, with respect to design, delivery, and maintenance of secure...

Continue reading

Want to deter threat actors? Start by nullifying your data leaks.

Companies that have experienced a breach, underperform the market by > 15%, even years later. Here are...

Continue reading

What is shadow IT and how do you manage shadow IT...

More than 1 in 5 organizations have experienced a security incident due to shadow IT. What are...

Continue reading

Threat actors’ next big target: VIPs, Executives, and Board members

Senior executives are 12 times more likely to be targets of social incidents, and 9 times more...

Continue reading

Combating data breaches caused by misconfigured apps

There has been a precipitous rise in the number of COVID-themed data breaches. Here are security practices...

Continue reading