Category: Uncategorized

Be diligent while watching or skipping ads in between your favourite youtube videos

Be diligent while watching or skipping ads in between your favourite youtube videos

Introduction: In the intricate world of cybersecurity threats, a disturbing convergence has surfaced on YouTube, where seemingly innocent videos promoting cracked software harbor a malevolent secret – the distribution of Lumma Stealer. In this comprehensive exploration, we delve into the deceptive landscape of YouTube videos enticing users with promises of free premium software, uncovering the

Read More
Unveiling How Malware Defies Password Resets via Google MultiLogin Exploit

Unveiling How Malware Defies Password Resets via Google MultiLogin Exploit

In our earlier blog, we talked about how some people could misuse Google OAuth to take over someone’s session without permission. Surprisingly, this seemingly harmless part turned out to be a favorite for malware that steals information. CloudSEK found a serious problem where malware uses MultiLogin to keep control of a user’s session, even after

Read More
Exploiting Google OAuth Endpoint for Unauthorized User Session Hijacking

Exploiting Google OAuth Endpoint for Unauthorized User Session Hijacking

In the dynamic landscape of cybersecurity, a recent revelation by threat actor “Prisma” has brought to light a significant exploit that allows the generation of persistent Google cookies through token manipulation. This discovery, highlighted by CloudSEK’s threat intelligence researcher, Pavan Karthick M, has far-reaching implications, shaping the narrative of cyber threats in recent times.  

Read More
Mastering ISO 27001 Implementation: Your Comprehensive Handbook

Mastering ISO 27001 Implementation: Your Comprehensive Handbook

Introduction In today’s digital world, protecting sensitive information and data is of utmost importance. That’s why many organizations turn to international standards like ISO 27001 to establish robust information security management systems (ISMS). Implementing ISO 27001 can provide a framework for identifying risks, implementing controls, and ensuring the confidentiality, integrity, and availability of information. In

Read More