Sekoia.io builds a CTI (cyber threat intelligence) that aims to be operationalized into detection and hunting activities.| Sekoia.io Blog
Discover how the Tactics, Techniques and Procedures (TTPs) used by the APT27 (Lucky Mouse) are detected using Sekoia.io.| Sekoia.io Blog
Since September 2022, Aurora malware is advertised as an infostealer and several traffers teams announced they added it to their malware toolset.| Sekoia.io Blog
Sekoia.io C2 Trackers identified more than 85,000 IP addresses used as C2 servers in 2023, an increase of more than 30% compared to 2022.| Sekoia.io Blog
Get the power of a next-generation SIEM tool that can escalate events, detect anomalies and automate incident responses.| Sekoia.io
Indicator of compromise is qualified technical data that makes it possible to detect malicious activities on an information system.| Sekoia.io
Traffers are responsible for redirecting user traffic to malicious content (malware, fraud, phishing, scam) exploited by other threat actors.| Sekoia.io Blog
On June 10, 2022, SEKOIA.IO analysts stumbled upon active servers hosting a web page named “Raccoon Stealer 2.0”. Discover their research.| Sekoia.io Blog