les xdr sont les solutions de choix pour lutter contre les menaces ransomware et arrêter les attaques avant impact...| Sekoia.io Blog
Tycoon 2FA has become one of the most widespread adversary-in-The-Middle (AiTM) phishing kits over the last few months.| Sekoia.io Blog
Cyber Threat Intelligence (CTI) defines cyber threat research, analysis and modeling. It'is used to prevent and detect computer attacks.| Sekoia.io
Security Operations Center is an organizational structure dedicated to the implementation of an organization's security against cyberattacks| Sekoia.io
Indicator of compromise is qualified technical data that makes it possible to detect malicious activities on an information system.| Sekoia.io
Traffers are responsible for redirecting user traffic to malicious content (malware, fraud, phishing, scam) exploited by other threat actors.| Sekoia.io Blog