Discover how the Tactics, Techniques and Procedures (TTPs) used by the APT27 (Lucky Mouse) are detected using Sekoia.io.| Sekoia.io Blog
Discover how SSDP are transforming SOCs and boosts MSSP activities into MDR and now MXDR services, transforming security service delivery.| Sekoia.io Blog
Enhance your security with IoCs. Discover how they identify threats in your logs and strengthen your overall security posture effectively.| Sekoia.io Blog
Explore a use-case scenario demonstrating how to detect scattered spider attacks in AWS environments and enhance your cloud security.| Sekoia.io Blog
RaaS is a software developed by cybercriminals that allows people to launch ransomware attacks without having any particular coding skills.| Sekoia.io
APT (Advanced Persistent Threat) is a sophisticated attack on an organization that can take months to identify and remove.| Sekoia.io
Security Orchestration Automation and Response system covers three major functions: response, orchestration and automation of IT security.| Sekoia.io
STIX is an open standard describing objects of interest in the field of defensive computer warfare, and the links they can maintain between them.| Sekoia.io
Within our SOC platform, cyber threat detection is one of the core elements of our approach. Discover our solution.| Sekoia.io
On SEKOIA.IO, automate through a soar software integrated on our SOC platform, incident responses without human intervention, before impact.| Sekoia.io
Discover how new cybersecurity tools can revolutionize SOC operations. Boost efficiency and stay ahead of cyber threats with integrated solutions.| Sekoia.io Blog
Since September 2022, Aurora malware is advertised as an infostealer and several traffers teams announced they added it to their malware toolset.| Sekoia.io Blog
Cyber Threat Intelligence (CTI) defines cyber threat research, analysis and modeling. It'is used to prevent and detect computer attacks.| Sekoia.io
Security Operations Center is an organizational structure dedicated to the implementation of an organization's security against cyberattacks| Sekoia.io
Get the power of a next-generation SIEM tool that can escalate events, detect anomalies and automate incident responses.| Sekoia.io
We provide cyber teams a turnkey cyber SOC to detect and respond to incidents, regardless of the attack surface.| Sekoia.io
Sekoia.io provides cyber teams with a SOC platform that can respond to security incidents, regardless of the attack surface.| Sekoia.io
Indicator of compromise is qualified technical data that makes it possible to detect malicious activities on an information system.| Sekoia.io