unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
PlugX worm disinfection campaign feedbacks
Table of contentsFrom theory to practicePlugX worm disinfection campaign resultsCo...
2024-12-26 09:31:25 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
tdr
autonomous
plugx
sinkhole
Happy YARA Christmas!
Table of contentsWhat is YARA?YARA rules at Sekoia.ioRule creation processCustom t...
2024-12-19 09:17:16 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
malicious
tdr
ariane
analysis
Detection engineering at scale: one step closer (part one)
Table of contentsA Two-Faced issueAttackers on the riseDefense all over the placeP...
2024-12-16 09:16:52 | 阅读: 21 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
microsoft
aitm
attackers
faced
The story behind Sekoia.io Custom Integrations
Since launching in 2017, Sekoia.io has made a name for itself with its groundbreak...
2024-12-12 16:47:19 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
hackathon
creativity
stage
amazing
Blocklist in Sekoia
On a calm Friday afternoon, rumors of a new active threat starts hitting the vario...
2024-12-3 18:46:39 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
security
blocklist
network
dates
Helldown Ransomware: an overview of this emerging threat
This report on Helldown was originally published for our customers on 14 November...
2024-11-19 16:1:25 | 阅读: 29 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
ransomware
helldown
zyxel
analysis
darkrace
A three beats waltz: The ecosystem behind Chinese state-sponsored cyber threats
What's next...
2024-11-13 23:16:23 | 阅读: 19 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
clickfix
tactic
mssp
outsourced
revenge
ClickFix tactic: Revenge of detection
This report on ClickFix was originally published for our customers on 22 October 2...
2024-11-5 16:16:22 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
clickfix
powershell
network
mshta
payload
ClickFix tactic: The Phantom Meet
Table of contentsContextClickFix in the wildChronological overview of ClickFix cam...
2024-10-17 16:46:26 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
clickfix
traffers
payload
sekoia
c2
Mastering SOC complexity: Optimizing access management with Sekoia Defend
Table of contentsManaging access across teams: The challenge in SOC modelsHow Seko...
2024-10-10 17:46:58 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
sekoia
defend
segregation
intakes
Mamba 2FA: A new contender in the AiTM phishing ecosystem
Table of contentsIntroductionCharacteristics of Mamba 2FA phishing pagesURL struct...
2024-10-7 21:17:1 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
phishing
mamba
sv
o365
2607
Getting started with Detection-as-Code and Sekoia Platform
Table of contentsIntroductionWhat is Detection-as-Code?Key benefits for MSSPs and...
2024-10-4 16:17:4 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
sigma
detections
github
repository
Hunting for IoCs: from singles searches to an automated and repeatable process
Table of contentsHow Sekoia can help you scale in IoC hunting and retro huntingKey...
2024-10-3 18:47:2 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
defend
threats
security
retro
Bulbature, beneath the waves of GobRAT
Key TakeawaysSince mid 2023, Sekoia Threat Detection & Research team (TDR)...
2024-10-2 16:17:1 | 阅读: 63 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
bulbature
gobrat
c238
staging
txt2023
Why it’s time to replace your legacy SIEM with a SOC platform
Table of contentsThe Evolution from Legacy SIEM to Modern SOC Platforms: Why Now I...
2024-9-30 17:31:59 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
migration
threats
processes
workflows
Hadooken and K4Spreader: The 8220 Gang’s Latest Arsenal
This report was originally published for our customers on 24 September 2024....
2024-9-30 16:17:15 | 阅读: 35 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
hadooken
8220
k4spreader
tsunami
windows
Navigating the NIS2 Directive: Key insights for cybersecurity compliance and how Sekoia.io can help
To read the French version the article, click here.The European Union (EU) ado...
2024-9-26 16:32:9 | 阅读: 8 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
nis2
directive
security
sekoia
SilentSelfie: Uncovering a major watering hole campaign against Kurdish websites
Key TakeawaysIn early 2024, Sekoia Threat Detection & Research team (TDR) was...
2024-9-25 15:32:0 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
kurdish
rojnews
rojava
php
malicious
WebDAV-as-a-Service: Uncovering the infrastructure behind Emmenhtal loader distribution
This report was originally published for our customers on 30 August 2024.Table...
2024-9-19 16:2:5 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
webdav
malicious
emmenhtal
loader
mshta
A glimpse into the Quad7 operators’ next moves and associated botnets
Key TakeawaysThe Sekoia TDR team has recently identified new staging servers,...
2024-9-9 21:16:56 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
quad7
netd
alogin
updtae
fsynet
Previous
2
3
4
5
6
7
8
9
Next