Detect the ClickFix tactic: a social engineering technique using fake video calls and CAPTCHA pages to deploy malicious code.| Sekoia.io Blog
Enhance your security with Detection-as-Code (DaC). Discover the benefits of code-driven threat detection for MSSPs and SOC teams.| Sekoia.io Blog
This report explores current trends in the AitM phishing landscape and the prevalence of leading kits. La publication suivante Global analysis of Adversary-in-the-Middle phishing threats est un article de Sekoia.io Blog.| Sekoia.io Blog
During our daily tracking and analysis routine at Sekoia TDR team (Threat Detection & Research), we have been monitoring an attacker infrastructure internally called “Cloudflare tunnel infrastructure to deliver multiple RATs”. This infrastructure is used by several actors to host malicious files and deliver remote access trojans (RAT). Several security vendors (Forcepoint, Fortinet, Orange, Proofpoint) […] La publication suivante Detecting Multi-Stage Infection Chains Madness est un...| Sekoia.io Blog
Discover the power of detection engineering and how it can help scale your cybersecurity projects efficiently.| Sekoia.io Blog
Discover the power of detection engineering and how it can help scale your cybersecurity projects efficiently.| Sekoia.io Blog
In this blog post, learn about Sneaky 2FA, a new Adversary-in-the-Middle (AiTM) phishing kit targeting Microsoft 365 accounts.| Sekoia.io Blog
Discover how Sekoia.io addresses SOC and Detection Engineering challenges with innovative continuous monitoring and review approaches.| Sekoia.io Blog
On a calm Friday afternoon, rumors of a new active threat starts hitting the various social network websites. Your CSIRT team starts checking the private channels they have with other CERTs and starts compiling a list of Indicators of Compromise (IoCs). After careful consideration, they decided to block all communications with these IoCs on the […]| Sekoia.io Blog