Sekoia.io builds a CTI (cyber threat intelligence) that aims to be operationalized into detection and hunting activities.| Sekoia.io Blog
Discover how the Tactics, Techniques and Procedures (TTPs) used by the APT27 (Lucky Mouse) are detected using Sekoia.io.| Sekoia.io Blog
Enhance your security with IoCs. Discover how they identify threats in your logs and strengthen your overall security posture effectively.| Sekoia.io Blog
Explore a use-case scenario demonstrating how to detect scattered spider attacks in AWS environments and enhance your cloud security.| Sekoia.io Blog
Security Orchestration Automation and Response system covers three major functions: response, orchestration and automation of IT security.| Sekoia.io
Open XDR architecture is a framework designed to improve threat detection and incident response across an organization's entire IT ecosystem| Sekoia.io
Discover daily YARA usage at Sekoia.io TDR. Learn how YARA rules identify threats and aid in investigations and DFIR engagements.| Sekoia.io Blog
Explore XDR, a powerful cybersecurity solution that offers advanced threat detection, AI-driven response and enhanced incident response.| Sekoia.io
STIX is an open standard describing objects of interest in the field of defensive computer warfare, and the links they can maintain between them.| Sekoia.io
Since September 2022, Aurora malware is advertised as an infostealer and several traffers teams announced they added it to their malware toolset.| Sekoia.io Blog
Cyber Threat Intelligence (CTI) defines cyber threat research, analysis and modeling. It'is used to prevent and detect computer attacks.| Sekoia.io
Security Operations Center is an organizational structure dedicated to the implementation of an organization's security against cyberattacks| Sekoia.io
We provide cyber teams a turnkey cyber SOC to detect and respond to incidents, regardless of the attack surface.| Sekoia.io
Our XDR platform allows you to secure your environments from a single platform. It is suitable for both managers and security teams.| Sekoia.io
Sekoia.io provides cyber teams with a SOC platform that can respond to security incidents, regardless of the attack surface.| Sekoia.io
Indicator of compromise is qualified technical data that makes it possible to detect malicious activities on an information system.| Sekoia.io