Discover how the Tactics, Techniques and Procedures (TTPs) used by the APT27 (Lucky Mouse) are detected using Sekoia.io.| Sekoia.io Blog
How can we provide Sekoia.io XDR's users with more than 500 detection rules to overcome the limitations of SIEM technology?| Sekoia.io Blog
Discover how Sekoia.io addresses SOC and Detection Engineering challenges with innovative continuous monitoring and review approaches.| Sekoia.io Blog
Learn about main log sources for AWS and relevant events defenders could use to improve detection capabilities against attackers.| Sekoia.io Blog
Discover the importance of IAM event detection and why it's vital to protecting digital assets from cyber threats.| Sekoia.io Blog