Sekoia.io builds a CTI (cyber threat intelligence) that aims to be operationalized into detection and hunting activities.| Sekoia.io Blog
This article shows how automation can reduce cybersecurity risks. Read and discover how you can reduce cyber-risks.| Sekoia.io Blog
How can we provide Sekoia.io XDR's users with more than 500 detection rules to overcome the limitations of SIEM technology?| Sekoia.io Blog
This blog post deals with the different products of Microsoft Defender Antivirus and also reports on the detection engineering around MDAV.| Sekoia.io Blog
Explore a use-case scenario demonstrating how to detect scattered spider attacks in AWS environments and enhance your cloud security.| Sekoia.io Blog
Sekoia.io analysts further investigated Bluenoroff’s infrastructure and share their findings in this report.| Sekoia.io Blog
Within our SOC platform, cyber threat detection is one of the core elements of our approach. Discover our solution.| Sekoia.io
Since September 2022, Aurora malware is advertised as an infostealer and several traffers teams announced they added it to their malware toolset.| Sekoia.io Blog
Our XDR platform allows you to secure your environments from a single platform. It is suitable for both managers and security teams.| Sekoia.io
Sekoia.io provides cyber teams with a SOC platform that can respond to security incidents, regardless of the attack surface.| Sekoia.io
PrivateLoader is a downloader malware family. It is used as part of a PPI service, to deliver payloads of multiple malware families.| Sekoia.io Blog
Traffers are responsible for redirecting user traffic to malicious content (malware, fraud, phishing, scam) exploited by other threat actors.| Sekoia.io Blog
On June 10, 2022, SEKOIA.IO analysts stumbled upon active servers hosting a web page named “Raccoon Stealer 2.0”. Discover their research.| Sekoia.io Blog