Discover how the Tactics, Techniques and Procedures (TTPs) used by the APT27 (Lucky Mouse) are detected using Sekoia.io.| Sekoia.io Blog
How can we provide Sekoia.io XDR's users with more than 500 detection rules to overcome the limitations of SIEM technology?| Sekoia.io Blog
Discover what SIEM is, how it works, and its benefits. Learn best practices and future trends in SIEM for enhancing security.| Sekoia.io
Since September 2022, Aurora malware is advertised as an infostealer and several traffers teams announced they added it to their malware toolset.| Sekoia.io Blog
We provide cyber teams a turnkey cyber SOC to detect and respond to incidents, regardless of the attack surface.| Sekoia.io
Traffers are responsible for redirecting user traffic to malicious content (malware, fraud, phishing, scam) exploited by other threat actors.| Sekoia.io Blog
On June 10, 2022, SEKOIA.IO analysts stumbled upon active servers hosting a web page named “Raccoon Stealer 2.0”. Discover their research.| Sekoia.io Blog