Nexus AI is Live! Turn Cyber Threats Data into Actionable Visuals with AI Precision. Built for CISOs.
Explore Nexus
Resources

Threat Intelligence

Discover how threat intelligence can help safeguard your organization's digital assets. Stay ahead of cyber threats with actionable insights.
CloudSEK researchers’ investigation discovered that the CoinEgg Scam/cryptocurrency scam was conducted by threat actors. We discovered an on-going malicious scheme involving multiple payment gateway domains and Android-based applications, used to lure unsuspecting individuals into a mass gambling scam.
June 14, 2022
CloudSEK team identified a post on a cybercrime forum where a threat actor posted the database of Rail Coach Factory, Kapurthala, India for free.
June 22, 2022
BeVigil has detected leaked Slack webhooks in one of the applications being monitored. Exposed webhooks can be leveraged to access sensitive data and also propagate phishing messages.
June 22, 2022
CloudSEK team has uncovered a banking trojan, with improvised modus operandi, where the threat actor or a group of threat actors host a simple online complaint portal having the domains like online-complaint[.]com or customer-complaint[.]com and target Indian banking customers.
June 22, 2022
XVigil has identified a surge in phishing sites hosted using reverse tunnel services. In this report, we delve into how threat actors use reverse tunnel services, along with URL shorteners, to orchestrate widespread campaigns, without leaving any traces.
June 22, 2022
DragonForce Malaysia has shared an exploit to bypass the Windows Server LPE LDR for targeting and exploiting Indian servers. The group has also shared a working PoC (Proof of Concept) video to substantiate their claims.
June 30, 2022
CloudSEK’s contextual AI digital risk platform XVigil has identified an increase in instances of organizations exposing Swagger user interfaces. Many of these instances have high exploitability risks.
June 30, 2022
XVigil identified a post on an English-speaking cybercrime forum mentioning Jenkins as one of the TTPs used by a threat actor. This module has hidden desktop takeover capabilities to get clicks on ads.
June 30, 2022

Download BeVigil App

Access to Underground Intelligence, Blog and Threat intelligence articles on your mobile as soon as it is published.

Google Play button to download App
Download CloudSEK BeVigil App
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Product Designer
Design
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Engineering Manager
Software Development
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
Account Executive
Sales
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
SEO Marketing Manager
Marketing
We’re looking for someone motivated and experienced to join our team.
Remote
Full-time
A newsletter that is upto date

Subscribe to our newsletter

Subscribe to the latest industry news, threats and resources.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
We Respect your privacy. Read our friendly privacy policy.

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.