unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Enabling new service models with SSDP
Platform enabled servicesIn previous posts (see links below), I’ve outlined al...
2024-7-31 16:46:59 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
socs
Emulating and Detecting Scattered Spider-like Attacks
Written by Mitigant (Kennedy Torkura) and Sekoia.io Threat Detection and Research...
2024-7-24 17:17:6 | 阅读: 16 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
cloud
security
attacker
mitigant
Solving the 7777 Botnet enigma: A cybersecurity quest
Table of contentsIntroductionAre all of these compromised TP-Links?First attempts...
2024-7-23 16:1:59 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
quad7
network
7777
routers
Technological Evolution and the Rise of Advanced Security Solutions for SMEs
The Modern Cybersecurity Landscape for SMEsIn today’s digital age, small and m...
2024-7-18 16:17:2 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
smes
security
sekoia
cloud
MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign
This report was originally published for our customers on 20 June 2024.Tod...
2024-7-16 03:46:59 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
muddywater
muddyrot
reverse
sekoia
c2
How Sekoia.io Uses the MITRE ATT&CK Framework to Enhance SOC Capabilities
This blogpost is part of a series of articles covering our vision of cybersecurity...
2024-7-3 18:17:6 | 阅读: 14 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
threats
sekoia
enhancing
Exposing FakeBat loader: distribution methods and adversary infrastructure
Table of contentsContextInteractions on cybercrime forumsFakeBat loaderAssociated...
2024-7-2 16:32:1 | 阅读: 27 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
fakebat
download
software
topads
c2
Efficiency driven SOC operations
In my previous article, I gave an overview of the current transformation of the cy...
2024-6-20 18:31:58 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
efficiency
threats
flexibility
What’s up with the new kids?
IntroductionThe cybersecurity market is undergoing significant transformation...
2024-6-5 18:32:10 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
sekoia
costs
evolving
Combining Sekoia Intelligence and OpenCTI
The Filigran x Sekoia.io partnership announcement is an opportunity to put the spo...
2024-6-4 21:1:50 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
opencti
sekoia
connector
filigran
leverages
PikaBot: a Guide to its Deep Secrets and Operations
Between 27 and 29 May 2024, international law enforcement agencies and partners...
2024-6-3 17:1:56 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
pikabot
c2
stage
012023
202024
Introducing Sekoia TDR
This time, we’re not revealing a new cyber threat investigation or analysis, but I...
2024-5-29 15:46:50 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
tdr
threats
sigma
reverse
Master of Puppets: Uncovering the DoppelGänger pro-Russian influence campaign
This report was originally published for our customers on 14 May 2024.Executiv...
2024-5-21 14:17:1 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
ukraine
stage
network
How to empower the MSSP business with the Sekoia SOC platform?
The managed security service market is blooming. Statista states it’s projected to...
2024-5-16 18:16:58 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
mssps
sekoia
security
client
communities
Elevating Cybersecurity: The Sekoia.io Methodology for Advanced Detection Engineering
Table of contentsThe Art and Expertise Behind Our Detection RulesPrioritizing Dept...
2024-5-15 15:46:58 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
security
threats
expertise
client
Guarding Democracy: Assessing Cyber Threats to 2024 Worldwide Elections
Executive SummaryIn 2024 multiple worldwide elections will be held with 5...
2024-4-30 20:16:58 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
elections
influence
electoral
Unplugging PlugX: Sinkholing the PlugX USB worm botnet
Table of contentsPlugX, an old cyber weapon in the Chinese arsenalWhen things go w...
2024-4-25 15:47:0 | 阅读: 26 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
plugx
worm
payload
Securing cloud perimeters
The global shift towards cloud computing is undeniable. According to Statista, the...
2024-4-22 15:46:53 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
cloud
sekoia
security
attackers
threats
AWS Detection Engineering
Table of contentsIntroductionThree main logs sources from AWSBuilding detection fo...
2024-4-18 20:32:1 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
cloudtrail
sekoia
guardduty
ec2
attacker
From EDR to XDR: Detailed Walkthrough
Table of contentsUnderstanding EDR and XDRComplementary CapabilitiesEmerging trend...
2024-4-5 17:48:30 | 阅读: 18 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
threats
network
mdr
cloud
Previous
3
4
5
6
7
8
9
10
Next