CloudSEK
AI-powered Digital Risk Monitoring enterprise.
Facebook
Facebook
Instagram
Instagram
YouTube
YouTube
LinkedIn
LinkedIn
Email
Email
Clubhouse
Clubhouse
X
X
How Leaked Twitter API Keys Can be Used to Build a Bot Army
How Leaked Twitter API Keys Can be Used to Build a Bot Army
Download report on CloudSEKâs Attack Surface Monitoring Platform, uncovered 3207 apps, leaking Twitter API keys, that can be utilized to gain access to or to take over Twitter accounts.
Social Media Nexus Spreads Color Prediction Games that Defraud Users
Social Media Nexus Spreads Color Prediction Games that Defraud Users
Social Media Nexus Spreads Color Prediction Games that Defraud Users
Generaly OTP Bot Setup for MFA Bypass Affecting P2P Services
Generaly OTP Bot Setup for MFA Bypass Affecting P2P Services
Hacktivist Group DragonForce Actively Targeting Indian Entities, Shares an Exploit for a Critical Confluence Server Vulnerability CVE-2022-26134
Hacktivist Group DragonForce Actively Targeting Indian Entities, Shares an Exploit for a Critical Confluence Server Vulnerability CVE-2022-26134
Missing Endpoint Authentication in F5 BIG-IP Leads to Remote Code Execution
Missing Endpoint Authentication in F5 BIG-IP Leads to Remote Code Execution
Tracking the Operators of the Newly Emerged BlueSky Ransomware
Tracking the Operators of the Newly Emerged BlueSky Ransomware
CloudSEKâs contextual AI digital risk platform XVigil discovered a financially motivated ransomware group, dubbed BlueSky, speculated to be connected to the Conti ransomware group.
Indian Rail Coach Factory PII and Credentials Shared From Past Data Breaches
Indian Rail Coach Factory PII and Credentials Shared From Past Data Breaches
Analysis and Attribution of the Eternity Ransomware: Timeline and Emergence of the Eternity Group
Analysis and Attribution of the Eternity Ransomware: Timeline and Emergence of the Eternity Group
Ransomware encrypts files, demands three good deeds to restore data đ° Register
Ransomware encrypts files, demands three good deeds to restore data đ° Register
GoodWill ransomware forces victims to donate to the poor and provides financial assistance to patients in need
GoodWill ransomware forces victims to donate to the poor and provides financial assistance to patients in need
6 Indian origin cybersecurity startups that are redefining digital security landscape | đ° YourStory
6 Indian origin cybersecurity startups that are redefining digital security landscape | đ° YourStory
[Report] Cyber Threats Targeting the Global Education Sector on the Rise
[Report] Cyber Threats Targeting the Global Education Sector on the Rise
CyberAttacks on Education Sector | đ° GadgetsNow Report
CyberAttacks on Education Sector | đ° GadgetsNow Report
[Blog] Detailed writeup on LAPSUS$ Cybercriminal Group who have compromised Microsoft and Okta
[Blog] Detailed writeup on LAPSUS$ Cybercriminal Group who have compromised Microsoft and Okta
[Update]Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft, Okta, and Globant
[Blog] Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass
[Blog] Malicious Macros and Zone Identifier Alternate Data Stream Information Bypass
Phishing Scams - đ° Bleeping Computers Report
Phishing Scams - đ° Bleeping Computers Report
Phishing Scams - đ° TheHindu Report
Phishing Scams - đ° TheHindu Report
Phishing Scams - đ° TechWire Asia Report
Phishing Scams - đ° TechWire Asia Report
Phishing Scams - đ° ETCISO Report
Phishing Scams - đ° ETCISO Report
Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine
Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine
Technical Analysis of The Hermetic Wiper Malware Used to Target Ukraine
Phishing Scams Targeting the Indian Electric Vehicle Industry on the Rise - Report
Phishing Scams Targeting the Indian Electric Vehicle Industry on the Rise - Report
Technical Analysis of Code-Signed âBlisterâ Malware Campaign (Part 2)
Technical Analysis of Code-Signed âBlisterâ Malware Campaign (Part 2)
Exposed HubSpot API Keys Compromise 1.6 Million Usersâ Data
Exposed HubSpot API Keys Compromise 1.6 Million Usersâ Data
Growing Surge of Cybersecurity Challenges in Neobanking
Growing Surge of Cybersecurity Challenges in Neobanking
Dangerous Android Permissions To Look Out For In Your Apps
Dangerous Android Permissions To Look Out For In Your Apps
Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability
Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability
Emerging Threat Actorâs Phishing Services Could Potentially Impact Millions of Users Globally
Emerging Threat Actorâs Phishing Services Could Potentially Impact Millions of Users Globally
Emotet 2.0: Everything you need to know about the new Variant of the Banking Trojan
Emotet 2.0: Everything you need to know about the new Variant of the Banking Trojan
Earn While you Learn Internship Program đ
Earn While you Learn Internship Program đ
Resurgence of DJVU/STOP Ransomware Strain in the Wild - PART 1
Resurgence of DJVU/STOP Ransomware Strain in the Wild - PART 1
Resurgence of DJVU/STOP Ransomware Strain in the Wild - PART 2
Resurgence of DJVU/STOP Ransomware Strain in the Wild - PART 2
Advanced Automated Social Engineering Bots: The High Tide of Social Engineering Bots and the Scammers Riding Them
Advanced Automated Social Engineering Bots: The High Tide of Social Engineering Bots and the Scammers Riding Them
Abysmal State of Global Critical Infrastructure Security - Report Download
Abysmal State of Global Critical Infrastructure Security - Report Download
The Shang-Chi Malware Campaign: Is your pirated copy of the summer blockbuster laced with a RAT? - BLOG
The Shang-Chi Malware Campaign: Is your pirated copy of the summer blockbuster laced with a RAT? - BLOG
How Does k3d Knock Other Kubernetes Clusters Off Their Pedestals?
How Does k3d Knock Other Kubernetes Clusters Off Their Pedestals?
The Unabated Reign of ATM Hacking: The 2021 Rajasthan ATM Attack and the Proliferation of Novel ATM Hacking Tools and Techniques
The Unabated Reign of ATM Hacking: The 2021 Rajasthan ATM Attack and the Proliferation of Novel ATM Hacking Tools and Techniques
Payment API Bungling Exposes Millions of Usersâ Payment Data - THREATPOST
Payment API Bungling Exposes Millions of Usersâ Payment Data - THREATPOST
10 mobile apps using Razorpay payment gateway expose transaction keys
10 mobile apps using Razorpay payment gateway expose transaction keys
Exposed Payment Integration API Keys Imperil Millions of Usersâ Transaction Details and PII
Exposed Payment Integration API Keys Imperil Millions of Usersâ Transaction Details and PII
Home Ministry Proposes Ban on VPN Services: Should You Be Worried?
Home Ministry Proposes Ban on VPN Services: Should You Be Worried?
Gullible youths fall prey to online job scams
Gullible youths fall prey to online job scams
Making the Corporate to Startup Switch Work - Nistul Raj
Making the Corporate to Startup Switch Work - Nistul Raj
Beat Compliance Fatigue With PrivacyTech
Beat Compliance Fatigue With PrivacyTech
The Darkweb Crypto Lifecycle: How Cyber Criminals Misuse and Cash Out Crypto Funds
The Darkweb Crypto Lifecycle: How Cyber Criminals Misuse and Cash Out Crypto Funds
CloudSEKâs Selenium Grid Architecture and Data Acquisition
CloudSEKâs Selenium Grid Architecture and Data Acquisition
A Sales Junkieâs Playbook - Harpreet's Experience
A Sales Junkieâs Playbook - Harpreet's Experience
Everything You Need to Know about the Pegasus Spyware
Everything You Need to Know about the Pegasus Spyware
Kaseya VSA Supply Chain Ransomware Incident
Kaseya VSA Supply Chain Ransomware Incident
Our PrivacyTech Thesis: Paving the Future - Omidyar Network Thesis
Our PrivacyTech Thesis: Paving the Future - Omidyar Network Thesis
Global Cyber Threat Landscape Q2 2021
Global Cyber Threat Landscape Q2 2021
XVigilâs Fake Domain Finder: A Deep-dive on the Acquisition Component and Crawlers
XVigilâs Fake Domain Finder: A Deep-dive on the Acquisition Component and Crawlers
Being a Security Analyst: At the Intersection of Research and Client Engagement - Charlton's Experience
Being a Security Analyst: At the Intersection of Research and Client Engagement - Charlton's Experience
Dominoâs Breach and Nucleus Ransomware Attack: More Than Just Isolated Incidents?
Dominoâs Breach and Nucleus Ransomware Attack: More Than Just Isolated Incidents?
Know everything about BeVigil - the420 Article.
Know everything about BeVigil - the420 Article.
Modern Underground Marketplaces and Digital Goods
Modern Underground Marketplaces and Digital Goods
Cring Ransomware Fortinet Attack Threat Intel Advisory
Cring Ransomware Fortinet Attack Threat Intel Advisory
RDP, RDWEB, Citrix Access to Multiple Educational Institutions for Sale
RDP, RDWEB, Citrix Access to Multiple Educational Institutions for Sale
VPN Access of Company with Annual Revenue of $15 Billion for Sale
VPN Access of Company with Annual Revenue of $15 Billion for Sale
Over a Million PII of Livpure Customers Leak on Cybercrime Forum - Threat Intelligence
Over a Million PII of Livpure Customers Leak on Cybercrime Forum - Threat Intelligence
Popular apps have vulnerabilities in how they connect to the cloud. At risk is usersâ personal data - ET Article
Popular apps have vulnerabilities in how they connect to the cloud. At risk is usersâ personal data - ET Article
Cloud Container Attack Tool (CCAT) and Cryptojacking
Cloud Container Attack Tool (CCAT) and Cryptojacking
Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys - HackerNews
Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys - HackerNews
This startup is changing the cybersecurity game - FortuneIndia
This startup is changing the cybersecurity game - FortuneIndia
Three Quick Wins to Address in an Active Directory Environment
Three Quick Wins to Address in an Active Directory Environment
7 Tips to Optimize Website Performance and Improve Page Load Speed
7 Tips to Optimize Website Performance and Improve Page Load Speed
Digital Brand Protection: A Game-changing Strategy for Online Brand Reputation
Digital Brand Protection: A Game-changing Strategy for Online Brand Reputation
CloudSEK is part of the Gartner Peer Insights Customer First program for Security Threat Intelligence Products and Services
CloudSEK is part of the Gartner Peer Insights Customer First program for Security Threat Intelligence Products and Services
Gootloader Malware Threat Intel Advisory
Gootloader Malware Threat Intel Advisory
My Career in AI Allows Me to Explore the Magic of Intelligent Machines - Shreyas Rawat
My Career in AI Allows Me to Explore the Magic of Intelligent Machines - Shreyas Rawat
Broken Authentication Vulnerabilities | Knowledge Sharing
Broken Authentication Vulnerabilities | Knowledge Sharing
Phishing Attacks 101: Types of Phishing Attacks and How to Prevent Them
Phishing Attacks 101: Types of Phishing Attacks and How to Prevent Them
DSCI India`s AI & ML Cyber Capabilities #Report - Link to Download
DSCI India`s AI & ML Cyber Capabilities #Report - Link to Download
DSCI India`s AI & ML Cyber Capabilities #ReportLaunch
DSCI India`s AI & ML Cyber Capabilities #ReportLaunch
The AI Development Lead Who Was Bitten by the Electricity Bug as a Kid
The AI Development Lead Who Was Bitten by the Electricity Bug as a Kid
Osiris Banking Trojan Threat Intelligence Advisory
Osiris Banking Trojan Threat Intelligence Advisory
Top 10 Indian companies leveraging AI & analytics to manage cyber risks - IndiaAI
Top 10 Indian companies leveraging AI & analytics to manage cyber risks - IndiaAI
Redefining the Principles of Product Management
Redefining the Principles of Product Management
CloudSEK CTF Challenge #3
CloudSEK CTF Challenge #3
RBI Appoints Rahul Sasi as a Part of its Expert Panel Constituted to Assess the Risk of Unregulated Digital Lending
RBI Appoints Rahul Sasi as a Part of its Expert Panel Constituted to Assess the Risk of Unregulated Digital Lending
DoppelPaymer Ransomware Threat Intel Advisory
DoppelPaymer Ransomware Threat Intel Advisory
Zyxel Hardcoded Vulnerability Threat Intel Advisory
Zyxel Hardcoded Vulnerability Threat Intel Advisory
Threat Actor leaks ~1.5 Billion Records from Multiple Chinese Databases in Recent Spree
Threat Actor leaks ~1.5 Billion Records from Multiple Chinese Databases in Recent Spree
Cobalt Strike Malware Threat Intel Advisory
Cobalt Strike Malware Threat Intel Advisory
Bouncy Castle Authentication Bypass Vulnerability Threat Intel Advisory
Bouncy Castle Authentication Bypass Vulnerability Threat Intel Advisory
AridViper Windows Malware Threat Intel Advisory
AridViper Windows Malware Threat Intel Advisory
The Security Engineer Who Creates His Own Opportunities
The Security Engineer Who Creates His Own Opportunities
Panel Discussion on 'Funded versus Bootstrapped Cyber Security Startup'
Panel Discussion on 'Funded versus Bootstrapped Cyber Security Startup'
Malware Analysis and Reverse Engineering: Analysing Magecart Skimmer
Malware Analysis and Reverse Engineering: Analysing Magecart Skimmer
Zebrocy Malware Laced Phishing Email Threat Intel Advisory
Zebrocy Malware Laced Phishing Email Threat Intel Advisory
UNC2452 Threat Actor Group Threat Intel Advisory
UNC2452 Threat Actor Group Threat Intel Advisory
Carbanak/ FIN7 Crime Gang Threat Intel Advisory
Carbanak/ FIN7 Crime Gang Threat Intel Advisory
AnalyticParameter Adware Threat Intelligence
AnalyticParameter Adware Threat Intelligence
Xanthe Cryptomining Botnet Threat Intel Advisory
Xanthe Cryptomining Botnet Threat Intel Advisory
Centralized Log Management with ELK Stack
Centralized Log Management with ELK Stack
Mushtik Botnet Threat Intel Advisory
Mushtik Botnet Threat Intel Advisory
Patch Released for Critical Apache Unomi RCE Vulnerability
Patch Released for Critical Apache Unomi RCE Vulnerability
HEH Botnet Wipes Routers, Servers, and IoT Devices
HEH Botnet Wipes Routers, Servers, and IoT Devices
XVigil Community - CTF Challenge
XVigil Community - CTF Challenge
How to use Prometheus to Monitor Complex Applications and Infrastructure
How to use Prometheus to Monitor Complex Applications and Infrastructure
CloudSEK community grant
CloudSEK community grant
Leveraging STIX and TAXII for better Cyber Threat Intelligence (Part 1)
Leveraging STIX and TAXII for better Cyber Threat Intelligence (Part 1)
The Rise of Cybercrime on Telegram and Discord and the Need for Continuous Monitoring
The Rise of Cybercrime on Telegram and Discord and the Need for Continuous Monitoring
Fortinet SSL-VPN Vulnerability CVE-2018-13379: 49K+ Vulnerable Targets Listed
Fortinet SSL-VPN Vulnerability CVE-2018-13379: 49K+ Vulnerable Targets Listed
Git LFS Remote Code Execution Vulnerability - ADVISORY
Git LFS Remote Code Execution Vulnerability - ADVISORY
COVID-19 vaccine R&D under attack by state sponsored actors
COVID-19 vaccine R&D under attack by state sponsored actors
Hacking life as a Security Analyst and a social worker
Hacking life as a Security Analyst and a social worker
UNC1945 Hacker Group Threat Intel Advisory
UNC1945 Hacker Group Threat Intel Advisory
Event-Driven service using Lambdas - Event đ
Event-Driven service using Lambdas - Event đ
XDDown Downloader Malware Tool Threat Intel Advisory
XDDown Downloader Malware Tool Threat Intel Advisory
Firestarter Android Malware Threat Intel Advisory
Firestarter Android Malware Threat Intel Advisory
Past internships shaped my goal to become an entrepreneur | Nithya Kurian
Past internships shaped my goal to become an entrepreneur | Nithya Kurian
KashmirBlack Botnet Threat Intel Advisory
KashmirBlack Botnet Threat Intel Advisory
T-RAT Malware Threat Intel Advisory
T-RAT Malware Threat Intel Advisory
Discord Remote Code Execution Vulnerability Threat Intel Advisory
Discord Remote Code Execution Vulnerability Threat Intel Advisory
PyVil Remote Access Trojan Threat Intel Advisory
PyVil Remote Access Trojan Threat Intel Advisory
Zumanek Remote Access Trojan Threat Intel Advisory
Zumanek Remote Access Trojan Threat Intel Advisory
The Evolution of the Data Leak Extortion Ecosystem
The Evolution of the Data Leak Extortion Ecosystem
LokiBot Trojan Threat Intel Advisory
LokiBot Trojan Threat Intel Advisory
ThyssenKrupp sample database for sale on data leak website
ThyssenKrupp sample database for sale on data leak website
Development of a Language-Independent Microservice Architecture
Development of a Language-Independent Microservice Architecture
1 million IRCTC usersâ PII resurfaces on data sharing forum
1 million IRCTC usersâ PII resurfaces on data sharing forum
Redefining Products and Solutions at CloudSEK - Prerit Prasad
Redefining Products and Solutions at CloudSEK - Prerit Prasad
Conti ransomware
Conti ransomware
Fappy Ransomware Threat Intel Advisory
Fappy Ransomware Threat Intel Advisory
200K CAT 2019 test takersâ PII database leaked online
200K CAT 2019 test takersâ PII database leaked online
Evolved ProLock Ransomware Threat Intel Advisory
Evolved ProLock Ransomware Threat Intel Advisory
CloudSEKâs cheat sheet for setting strong passwords
CloudSEKâs cheat sheet for setting strong passwords
What makes web applications an easy target for hackers?
What makes web applications an easy target for hackers?
CloudSEKâs UX Designer hiring challenge and the victors
CloudSEKâs UX Designer hiring challenge and the victors
Worst cybersecurity strategies and how we can overcome them
Worst cybersecurity strategies and how we can overcome them
How to build a secure AWS infrastructure?
How to build a secure AWS infrastructure?
Cosplay party by Cloudsters
Cosplay party by Cloudsters
Security Use Cases & Solutions for Work from Home - DSCI
Security Use Cases & Solutions for Work from Home - DSCI
Earn while you learn Internship Program 2020
Earn while you learn Internship Program 2020
Cyber Trivia Quiz #1
Cyber Trivia Quiz #1
3.4M LiveAuctioneers usersâ PII and cracked passwords for sale on data sharing forum
3.4M LiveAuctioneers usersâ PII and cracked passwords for sale on data sharing forum
CloudSEK Spotlight - V2 Newsletter Edition.
CloudSEK Spotlight - V2 Newsletter Edition.
25,000 UAE Police Officersâ PII for Sale on Data Sharing Forum
25,000 UAE Police Officersâ PII for Sale on Data Sharing Forum
40,000+ Indian online marketplace suppliersâ data leaked
40,000+ Indian online marketplace suppliersâ data leaked
7.2 million records were exposed, but not from the BHIM app
7.2 million records were exposed, but not from the BHIM app
Leaked WHO user credentials resurface on popular trading forum
Leaked WHO user credentials resurface on popular trading forum
Threat actors, posing as Indian government departments, are sending malicious emails to organizations
Threat actors, posing as Indian government departments, are sending malicious emails to organizations
Ghost Squad Hackers targets and hacks Govt. of India Clean Money initiative website
Ghost Squad Hackers targets and hacks Govt. of India Clean Money initiative website
APT group Gamaredon adopts COVID-19 lures to spread malware
APT group Gamaredon adopts COVID-19 lures to spread malware
Syrian nation-state actor uses COVID lures to spread malware
Syrian nation-state actor uses COVID lures to spread malware
Dark web marketplace sells Iranian, Indian official websitesâ databases
Dark web marketplace sells Iranian, Indian official websitesâ databases
Zoom meeting codes leaked on public forum
Zoom meeting codes leaked on public forum
800 GB of Indian Tax Office data for sale on Russian hacking forum
800 GB of Indian Tax Office data for sale on Russian hacking forum
Zeus Sphinx banking Trojan masquerades as relief payment
Zeus Sphinx banking Trojan masquerades as relief payment
How to effectively manage remote AI teams ? - Webinar
How to effectively manage remote AI teams ? - Webinar
New crypto token claims to âhelpâ COVID-19 victims
New crypto token claims to âhelpâ COVID-19 victims
New dark web marketplace sells Xanax, Cannabis, and more
New dark web marketplace sells Xanax, Cannabis, and more
Weaponizing AI to orchestrate cyber attacks
Weaponizing AI to orchestrate cyber attacks
Menace of Fake Banking Services
Menace of Fake Banking Services
FASTag Phishing Campaigns Flourish on Social Media
FASTag Phishing Campaigns Flourish on Social Media
Chronic Phishing Targets Paytm, Flipkart, Amazon users
Chronic Phishing Targets Paytm, Flipkart, Amazon users
Dark Web and ATM Hacking
Dark Web and ATM Hacking
View on mobile
Explore other Linktrees
davestewart
@davestewart
myfavoritemurder
@myfavoritemurder
Yes I Do The Cooking
@yessidothecookingg
fiajames
@fiajames
breakingrust
@breakingrust
Mythical Kitchen
@mythicalkitchen
Dr. Holly
@drholly
Aaron Burriss
@aaron.burriss
goodnoticingspod
@goodnoticingspod
Jeremiah Brown
@FindJeremiah
previous
next
Discover more
See all
@Zdrava_Odluka
@livinglinesstudio
@varozie
@willemiinews
@MayflyFlyFishing
@ChawawaZ
@mexicancrush
@merakicrystal
@Quanisha99
@kubyyprod
@neocaridinashrimpcare
@Comercialdobairro
@engepvo
@pioneerchurchmemphis
@aspandtrinc
@herrahabibi
@yotipzy
@dipsum
@thekillernoise7
@campussocialclub
@incomeandimpact
@rex_rides
@psybypsy
@aceslowman
@aguerkuir
@mohd.razaini
@arkmissions
@DrAdrianDontix
@riyadh.saeed
@delucagroup
@oslocell
@Caracolacontramano
@Cecd
@zalamaletic
@matyldaxmodela
@Noamshneor_photography
@optimax.ec
@GameOne23
@behind.theroutine9
@prepasocietyofhuntercollege
@vaniaborgesacademy
@TheCozyWildflower
@Saraivavaleveiculos
@Kathrynsfx
@booya48