How attackers abuse Milesight cellular router APIs to run smishing at scale via unauthenticated SMS endpoints—targeting Belgium (CSAM/eBox).| Sekoia.io Blog
APT28 Operation Phantom Net Voxel: weaponized Office lures, COM-hijack DLL, PNG stego to Covenant Grunt via Koofr, BeardShell on icedrive.| Sekoia.io Blog
Explore the 2025 landscape of Adversary-in-the-Middle phishing threats with data, trends, and top detection insights.| Sekoia.io Blog
Sekoia.io builds a CTI (cyber threat intelligence) that aims to be operationalized into detection and hunting activities.| Sekoia.io Blog
Enhance your security with IoCs. Discover how they identify threats in your logs and strengthen your overall security posture effectively.| Sekoia.io Blog
Discover how Lazarus leverages fake job sites in the ClickFake Interview campaign targeting crypto firms using the ClickFix tactic.| Sekoia.io Blog
ClearFake spreads malware via compromised websites, using fake CAPTCHAs, JavaScript injections, and drive-by downloads.| Sekoia.io Blog
Discover PolarEdge, a newly identified botnet targeting edge devices via CVE-2023-20118, using a stealthy TLS backdoor.| Sekoia.io Blog
Stealc infostealer is another fully featured infostealer sold as a MaaS which emerged on underground forums in early 2023.| Sekoia.io Blog