How can we provide Sekoia.io XDR's users with more than 500 detection rules to overcome the limitations of SIEM technology?| Sekoia.io Blog
During our daily tracking and analysis routine at Sekoia TDR team (Threat Detection & Research), we have been monitoring an attacker infrastructure internally called “Cloudflare tunnel infrastructure to deliver multiple RATs”. This infrastructure is used by several actors to host malicious files and deliver remote access trojans (RAT). Several security vendors (Forcepoint, Fortinet, Orange, Proofpoint) […] La publication suivante Detecting Multi-Stage Infection Chains Madness est un...| Sekoia.io Blog
Explore a use-case scenario demonstrating how to detect scattered spider attacks in AWS environments and enhance your cloud security.| Sekoia.io Blog
Discover the power of detection engineering and how it can help scale your cybersecurity projects efficiently.| Sekoia.io Blog
Discover the power of detection engineering and how it can help scale your cybersecurity projects efficiently.| Sekoia.io Blog
Discover how Sekoia.io addresses SOC and Detection Engineering challenges with innovative continuous monitoring and review approaches.| Sekoia.io Blog
Learn about main log sources for AWS and relevant events defenders could use to improve detection capabilities against attackers.| Sekoia.io Blog
Discover the importance of IAM event detection and why it's vital to protecting digital assets from cyber threats.| Sekoia.io Blog