Tag: Research

Read our latest blog posts

Domino’s Breach and the Nucleus ransomware attack: More than just isolated...

We are investigating the possible attack vectors that could have led to the compromise of Domino’s Breach...

Continue reading

Helm: Paving the Way to Environment Aware Deployments

Creating and managing multiple deployments and sets of config. files can be a cumbersome task. But with...

Continue reading

How to Progressively Migrate to Redux Toolkit

Redux toolkit works with fewer lines of boilerplate codes, simplified code logic, and it boosts performance. How...

Continue reading

Juspay Databases Containing 10 Crore Users’ Data for Sale on Data...

CloudSEK has done a detailed analysis of the Juspay data leak that affects user records and has...

Continue reading

Malware Analysis and Reverse Engineering: Analysing Magecart Skimmer

We explore the process of Malware Analysis and Reverse Engineering (MA&RE) by analysing Magecart’s skimming malware.

Continue reading

Centralized Log Management with ELK Stack

We discuss the open source logging solution ELK Stack, why it is a popular choice among developers,...

Continue reading

How to use Prometheus to Monitor Complex Applications and Infrastructure

Prometheus is an open-source monitoring software designed to monitor containerized applications in a microservice architecture.

Continue reading

Leveraging STIX and TAXII for better Cyber Threat Intelligence (Part 1)

Using STIX feeds with TAXII enables organizations to exchange cyber threat intelligence in a more structured and...

Continue reading

The Rise of Cybercrime on Telegram and Discord and the Need...

Many Telegram and Discord groups are being used by cybercriminals to perform illegal activities such as selling...

Continue reading

MongoDB Sharding 101: Creating a Sharded Cluster

In the first part of this 2-part series on sharding on MongoDB, we describe the various concepts...

Continue reading