Our TDR team has been investigating the WebDAV infrastructure used to distribute the Emmenhtal loader. Here are some key insights:| Sekoia.io Blog
Sekoa.io helps companies to protect their cloud perimeters (AWS, Google Cloud, Azure). Enhance your cloud security with our in-built rules!| Sekoia.io Blog
Uncover an in-depth analysis of PikaBot, a malware loader used by Initial Access Brokers for network compromise and ransomware deployment.| Sekoia.io Blog
In 2024, EDR and XDR are merging, with platforms now covering endpoints, networks, cloud, and email to combat threats. This article explores their roles, differences, and the importance of managed security services in enhancing cybersecurity.| Sekoia.io Blog
Uncover an in-depth analysis of FakeBat: activities of the FakeBat operators, undocumented campaigns, and C2 infrastructure.| Sekoia.io Blog
Analyse the ClickFix tactic and related campaigns. Uncover a ClickFix campaign impersonating Google Meet and cybercrime infrastructure.| Sekoia.io Blog
Discover ViciousTrap, a newly identified threat who turning edge devices into honeypots en masse targeting| Sekoia.io Blog
Discover PolarEdge, a newly identified botnet targeting edge devices via CVE-2023-20118, using a stealthy TLS backdoor.| Sekoia.io Blog
In this blog post, learn about the supply chain attack targeting Chrome browser extensions and the associated targeted phishing campaign.| Sekoia.io Blog
Uncover the details of the DoppelGänger campaign, a Russian influence operation aimed at undermining support for Ukraine.| Sekoia.io Blog