Detect the ClickFix tactic: a social engineering technique using fake video calls and CAPTCHA pages to deploy malicious code.| Sekoia.io Blog
Sekoia.io builds a CTI (cyber threat intelligence) that aims to be operationalized into detection and hunting activities.| Sekoia.io Blog
Discover how the Tactics, Techniques and Procedures (TTPs) used by the APT27 (Lucky Mouse) are detected using Sekoia.io.| Sekoia.io Blog
Enhance your security with Detection-as-Code (DaC). Discover the benefits of code-driven threat detection for MSSPs and SOC teams.| Sekoia.io Blog
Sekoa.io helps companies to protect their cloud perimeters (AWS, Google Cloud, Azure). Enhance your cloud security with our in-built rules!| Sekoia.io Blog
How can we provide Sekoia.io XDR's users with more than 500 detection rules to overcome the limitations of SIEM technology?| Sekoia.io Blog
This blog post deals with the different products of Microsoft Defender Antivirus and also reports on the detection engineering around MDAV.| Sekoia.io Blog
Enhance your security with IoCs. Discover how they identify threats in your logs and strengthen your overall security posture effectively.| Sekoia.io Blog
Discover the power of detection engineering and how it can help scale your cybersecurity projects efficiently.| Sekoia.io Blog
In this blog post, learn about Sneaky 2FA, a new Adversary-in-the-Middle (AiTM) phishing kit targeting Microsoft 365 accounts.| Sekoia.io Blog
Discover how Sekoia.io addresses SOC and Detection Engineering challenges with innovative continuous monitoring and review approaches.| Sekoia.io Blog
On a calm Friday afternoon, rumors of a new active threat starts hitting the various social network websites. Your CSIRT team starts checking the private channels they have with other CERTs and starts compiling a list of Indicators of Compromise (IoCs). After careful consideration, they decided to block all communications with these IoCs on the […]| Sekoia.io Blog
Learn about main log sources for AWS and relevant events defenders could use to improve detection capabilities against attackers.| Sekoia.io Blog