This article shows how automation can reduce cybersecurity risks. Read and discover how you can reduce cyber-risks.| Sekoia.io Blog
Our TDR team has been investigating the WebDAV infrastructure used to distribute the Emmenhtal loader. Here are some key insights:| Sekoia.io Blog
Sekoa.io helps companies to protect their cloud perimeters (AWS, Google Cloud, Azure). Enhance your cloud security with our in-built rules!| Sekoia.io Blog
Uncover an in-depth analysis of PikaBot, a malware loader used by Initial Access Brokers for network compromise and ransomware deployment.| Sekoia.io Blog
In 2024, EDR and XDR are merging, with platforms now covering endpoints, networks, cloud, and email to combat threats. This article explores their roles, differences, and the importance of managed security services in enhancing cybersecurity.| Sekoia.io Blog
Uncover an in-depth analysis of FakeBat: activities of the FakeBat operators, undocumented campaigns, and C2 infrastructure.| Sekoia.io Blog
Analyse the ClickFix tactic and related campaigns. Uncover a ClickFix campaign impersonating Google Meet and cybercrime infrastructure.| Sekoia.io Blog
Discover ViciousTrap, a newly identified threat who turning edge devices into honeypots en masse targeting| Sekoia.io Blog
Discover PolarEdge, a newly identified botnet targeting edge devices via CVE-2023-20118, using a stealthy TLS backdoor.| Sekoia.io Blog
In this blog post, learn about the supply chain attack targeting Chrome browser extensions and the associated targeted phishing campaign.| Sekoia.io Blog
Tycoon 2FA has become one of the most widespread adversary-in-The-Middle (AiTM) phishing kits over the last few months.| Sekoia.io Blog
Explore how Endpoint Agent differs from EDR and collects events to forward logs to Sekoia XDR for in-depth analysis against detection rules.| Sekoia.io Blog
Sekoia.io C2 Trackers identified more than 85,000 IP addresses used as C2 servers in 2023, an increase of more than 30% compared to 2022.| Sekoia.io Blog