Log in

Whoops! You have to login to access the Reading Center functionalities!

Forgot password?

Search the site...

Research & Threat Intelligence

Peeking at Reaper’s surveillance operations

In this blogpost you will find the results of a survey conducted by our analysts on two Command and Control servers (C2s) of the North Korea-nexus intrusion set Reaper (aka APT37). This investigation led...

Read it later Remove

What's next

SEKOIA.IO analysis of the #VulkanFiles leak

In January 2023, French newspaper Le Monde offered SEKOIA.IO to cooperate on investigating exfiltrated Russian-written documents related to the...

The Energy sector 2022 cyber threat landscape

This report is a joint CITALID and SEKOIA.IO analysis pertaining to cyber activities targeting the energy sector in 2022...

Overview of the Russian-speaking infostealer ecosystem: the distribution

This blog post aims at presenting the main techniques, tools and social engineering schemes used by the cybercriminals from...

Comments are closed.