
Excedo Security Operations | Digital Crimes Unit – Fighting Cybercrime 24/7/365
The internet powers our world - but it also fuels cybercrime. Every day, phishing campaigns, malware, and botnets target businesses and individuals alike. Combating this scale of threat requires constant vigilance, collaboration, and intelligence sharing. At Excedo Networks | Security Operations Center | Digital Crimes Unit (DCU), we are on the frontlines of this battle. Our team operates 24/7/365, detecting and disrupting internet-related crimes in real time. Because when cybercriminals do not rest, neither can we.

The Cybersecurity Act – from regulatory burden to competitive advantage
The upcoming Swedish Cybersecurity Act, which is based on the EU's NIS2 Directive, is often described as yet another heavy burden on organizations. But I would like to challenge that view. In fact, this law could mark the beginning of a new era: one in which cybersecurity is no longer a side issue, but a strategic opportunity and a key to competitiveness.

Miljödatas leak reveals shortcomings in security management and procurement requirements
On August 23, 2025, IT supplier Miljödata AB was hit by a major cyberattack that knocked out important HR systems in over 160 Swedish municipalities and several regions. Miljödata supplies the Adato rehabilitation and HR system, which is used by 80% of Sweden's municipalities. The attack resulted in the theft of personal data for over one million Swedish citizens—including names, personal identification numbers, addresses, and contact details—linked to employees in municipalities such as Stockholm, Gothenburg, Linköping, and others.

Cloudflare’s Accountability Gap: How “Content Neutrality” Shields Crime
Cloudflare is a linchpin of the modern Internet’s infrastructure, yet its “content-neutral” stance has repeatedly allowed phishing, malware, and extremist sites to hide behind its network. Security researchers warn that about 10.05% of all spam/malicious domains use Cloudflare’s nameservers, and that attackers routinely move flagged domains behind Cloudflare to “disguise the backend.”

Enterprise Guide to protecting Websites, Applications and APIs from threats
In today's digital landscape, a brand's online presence extends far beyond a single website. Enterprises typically maintain numerous digital touchpoints, including multiple websites, mobile applications, web applications, and APIs that connect numerous services and systems. While this digital ecosystem enables efficient operations and enhanced customer experiences, it also presents an expanded attack surface that cybercriminals actively exploit. The cost of such exploitation can be extremely high. Beyond the immediate financial losses of a successful attack, which averaged $4.35 million per data breach in 2022, organisations can also face long-term reputation damage, loss of customer trust, regulatory penalties, and potential legal liabilities if they do not properly protect themselves.

What is a DDoS Attack?
DDoS (Distributed Denial of Service) attacks threaten the availability of essential services and systems worldwide. The first step to protection is to understand what these attacks look like and what vulnerabilities they exploit.
Corporate Address
Jan Stenbecks torg 17
164 40 KISTA
SWEDEN