Explore the 2025 landscape of Adversary-in-the-Middle phishing threats with data, trends, and top detection insights.| Sekoia.io Blog
Could blockchain have prevented WannaCry? Explore how secure, decentralized intelligence sharing might have changed everything—and what we can do better next time.| Blue Headline
This report explores current trends in the AitM phishing landscape and the prevalence of leading kits. La publication suivante Global analysis of Adversary-in-the-Middle phishing threats est un article de Sekoia.io Blog.| Sekoia.io Blog
As the cyber threat landscape evolves and the digital landscape changes, regulatory frameworks continue to emerge, aiming to bolster the security posture of organisations, particularly in the financial sector. One such regulation is the Digital Operational Resilience Act (DORA), effective since January 2025, which sets stringent security requirements for financial entities operating within the European […] La publication suivante Navigating DORA: How Sekoia.io can support your compliance jo...| Sekoia.io Blog
Analysis of the CVE-2025-32432 compromise chain by Mimo: exploitation, loader, crypto miner, proxyware, and detection opportunities.| Sekoia.io Blog
When I originally posted the blog post that lived on this page a lot of CTI professionals got sad and had a go at me. My view of Offensive CTI is using TA knowledge to better improve red team and offensive security for defence. There is also an element of| ZephrSec - Adventures In Information Security
Discover ViciousTrap, a newly identified threat who turning edge devices into honeypots en masse targeting| Sekoia.io Blog
Discover how Lazarus leverages fake job sites in the ClickFake Interview campaign targeting crypto firms using the ClickFix tactic.| Sekoia.io Blog
ClearFake is a malicious JavaScript framework deployed on compromised websites to deliver malware through the drive-by download technique. When it first emerged in July 2023, the injected code was designed to display a fake web browser download page, tricking users into downloading counterfeit browser updates. By May 20241, ClearFake adopted the new social engineering tactic ClickFix, displaying fake error messages in the web browser and deceiving users into copying and executing a given mali...| Sekoia.io Blog
Discover PolarEdge, a newly identified botnet targeting edge devices via CVE-2023-20118, using a stealthy TLS backdoor.| Sekoia.io Blog
Delve into Finance-related cyber threats in 2024. Our report highlights major actors and tactics impacting the financial sector.| Sekoia.io Blog
In this blog post, learn about the supply chain attack targeting Chrome browser extensions and the associated targeted phishing campaign.| Sekoia.io Blog
In this blog post, learn about Sneaky 2FA, a new Adversary-in-the-Middle (AiTM) phishing kit targeting Microsoft 365 accounts.| Sekoia.io Blog
Learn about the transformation happening in the cybersecurity market and the benefits of migrating to SaaS-based platforms.| Sekoia.io Blog
Learn about NoName057(16), a pro-Russian hacktivist group behind Project DDoSia targeting entities supporting Ukraine. Discover an overview of the changes made by the group, both from the perspective of the software shared by the group to generate DDoS attacks and the specifics of the evolution of the C2 servers. It also provides an overview of the country and sectors targeted by the group for 2024.| Sekoia.io Blog
Discover our TDR team's revelations about Predator spyware: its C2 infrastructure and list of countries still using its cyber espionage tool.| Sekoia.io Blog
Discover the techniques, tactics (TTPs) used by Scattered Spider intrusion set, including social engineering and targeted phishing campaigns.| Sekoia.io Blog
Sekoia.io C2 Trackers identified more than 85,000 IP addresses used as C2 servers in 2023, an increase of more than 30% compared to 2022.| Sekoia.io Blog
This article sheds light on one of the infrastructure clusters employed by Lycantrox, potentially to compromise their targets.| Sekoia.io Blog