Instagram
Twitter
Featured
15K Fortigate Firewall Configs Leaked By Belsen Group: Dumped Using Zero-Day in 2022
Latest in
Research Reports
CloudSEK Canada Threat Landscape Report 2024
CloudSEK United States Threat Landscape Report 2024
Latest in
Blog
How Browser Extensions can Exploit User Activities for Malicious Operations
The Rise of Cybercrime on Telegram and Discord and the Need for Continuous Monitoring
Leveraging STIX and TAXII for better Cyber Threat Intelligence (Part 1)
How to use Prometheus to Monitor Complex Applications and Infrastructure
Centralized Log Management with ELK Stack
Previous
Next
No items found.
Latest in
Threat Intelligence
Two New Post-Auth 0-Day Vulnerabilities Affecting Microsoft Exchange Servers
Apollo OTP Bot Exploiting Google Voice for MFA Bypass
Upgraded Version of Generaly OTP Bot for MFA Bypass on Popular Payment Platforms
New DDoS-for-Hire Platform Advertised on Multiple Cybercrime Forums
Phishing Campaigns Targeting KFC and McDonald’s
Previous
Next
Resources
CloudSEK Blog
Threat Intelligence
White papers and Reports
No items found.