unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
How Sekoia.io Uses the MITRE ATT&CK Framework to Enhance SOC Capabilities
This blogpost is part of a series of articles covering our vision of cybersecurity...
2024-7-3 18:17:6 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
threats
sekoia
enhancing
Exposing FakeBat loader: distribution methods and adversary infrastructure
Table of contentsContextInteractions on cybercrime forumsFakeBat loaderAssociated...
2024-7-2 16:32:1 | 阅读: 23 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
fakebat
download
software
topads
c2
Efficiency driven SOC operations
In my previous article, I gave an overview of the current transformation of the cy...
2024-6-20 18:31:58 | 阅读: 7 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
efficiency
threats
flexibility
What’s up with the new kids?
IntroductionThe cybersecurity market is undergoing significant transformation...
2024-6-5 18:32:10 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
sekoia
costs
evolving
Combining Sekoia Intelligence and OpenCTI
The Filigran x Sekoia.io partnership announcement is an opportunity to put the spo...
2024-6-4 21:1:50 | 阅读: 9 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
opencti
sekoia
connector
filigran
leverages
PikaBot: a Guide to its Deep Secrets and Operations
Between 27 and 29 May 2024, international law enforcement agencies and partners...
2024-6-3 17:1:56 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
pikabot
c2
stage
012023
202024
Introducing Sekoia TDR
This time, we’re not revealing a new cyber threat investigation or analysis, but I...
2024-5-29 15:46:50 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
tdr
threats
sigma
reverse
Master of Puppets: Uncovering the DoppelGänger pro-Russian influence campaign
This report was originally published for our customers on 14 May 2024.Executiv...
2024-5-21 14:17:1 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
ukraine
stage
network
How to empower the MSSP business with the Sekoia SOC platform?
The managed security service market is blooming. Statista states it’s projected to...
2024-5-16 18:16:58 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
mssps
sekoia
security
client
communities
Elevating Cybersecurity: The Sekoia.io Methodology for Advanced Detection Engineering
Table of contentsThe Art and Expertise Behind Our Detection RulesPrioritizing Dept...
2024-5-15 15:46:58 | 阅读: 3 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
security
threats
expertise
client
Guarding Democracy: Assessing Cyber Threats to 2024 Worldwide Elections
Executive SummaryIn 2024 multiple worldwide elections will be held with 5...
2024-4-30 20:16:58 | 阅读: 5 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
elections
influence
electoral
Unplugging PlugX: Sinkholing the PlugX USB worm botnet
Table of contentsPlugX, an old cyber weapon in the Chinese arsenalWhen things go w...
2024-4-25 15:47:0 | 阅读: 22 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
plugx
worm
payload
Securing cloud perimeters
The global shift towards cloud computing is undeniable. According to Statista, the...
2024-4-22 15:46:53 | 阅读: 10 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
cloud
sekoia
security
attackers
threats
AWS Detection Engineering
Table of contentsIntroductionThree main logs sources from AWSBuilding detection fo...
2024-4-18 20:32:1 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
cloudtrail
sekoia
guardduty
ec2
attacker
From EDR to XDR: Detailed Walkthrough
Table of contentsUnderstanding EDR and XDRComplementary CapabilitiesEmerging trend...
2024-4-5 17:48:30 | 阅读: 15 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
security
threats
network
mdr
cloud
Sekoia.io and GLIMPS: a new example of interoperability within the Open XDR platform
This blogpost was written by Glimps and Sekoia.io teamsTable of contentsFirst...
2024-3-25 23:2:50 | 阅读: 17 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
glimps
sekoia
analysis
connector
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit
Table of contentsIntroductionContextUncovering of Tycoon 2FABackground of Tycoon 2...
2024-3-25 17:46:51 | 阅读: 91 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
phishing
tycoon
turnstile
stage
microsoft
Unveiling the depths of Residential Proxies providers
Written by World Watch team from CERT Orange Cyberdefense (Marine PICHON, Vincent...
2024-3-14 16:46:54 | 阅读: 118 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
resip
proxies
proxyware
proxy
comdomain
Enhancing security with IOC detection
Indicators of Compromise (IOCs) serve as signals, hinting at potential security br...
2024-3-13 19:17:16 | 阅读: 13 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
sekoia
database
security
indicator
The Architects of Evasion: a Crypters Threat Landscape
As of today, a large majority of intrusion sets and threat actors leverage crypter...
2024-3-8 19:46:57 | 阅读: 19 |
收藏
|
Over Security - Cybersecurity news aggregator - blog.sekoia.io
crypters
crypter
software
malicious
fud
Previous
2
3
4
5
6
7
8
9
Next