Uncover an in-depth analysis of PikaBot, a malware loader used by Initial Access Brokers for network compromise and ransomware deployment.| Sekoia.io Blog
Uncover an in-depth analysis of FakeBat: activities of the FakeBat operators, undocumented campaigns, and C2 infrastructure.| Sekoia.io Blog
With our Cyber threat intelligence tool, you can ensure the security of your environments by controlling threats and adversaries targeting your organization.| Sekoia.io
Discover how new cybersecurity tools can revolutionize SOC operations. Boost efficiency and stay ahead of cyber threats with integrated solutions.| Sekoia.io Blog
Stealc infostealer is another fully featured infostealer sold as a MaaS which emerged on underground forums in early 2023.| Sekoia.io Blog
Learn about the transformation happening in the cybersecurity market and the benefits of migrating to SaaS-based platforms.| Sekoia.io Blog
Tycoon 2FA has become one of the most widespread adversary-in-The-Middle (AiTM) phishing kits over the last few months.| Sekoia.io Blog
Cyber Threat Intelligence (CTI) defines cyber threat research, analysis and modeling. It'is used to prevent and detect computer attacks.| Sekoia.io
Security Operations Center is an organizational structure dedicated to the implementation of an organization's security against cyberattacks| Sekoia.io
Discover the importance of IAM event detection and why it's vital to protecting digital assets from cyber threats.| Sekoia.io Blog
Sekoia.io provides cyber teams with a SOC platform that can respond to security incidents, regardless of the attack surface.| Sekoia.io