Log in

Whoops! You have to login to access the Reading Center functionalities!

Forgot password?

Search the site...

Reset
Blogpost Research & Threat Intelligence

XDR detection engineering at scale: crafting detection rules for SecOps efficiency

In this blogpost we present SEKOIA.IO’s process to create detection rules, which first requires explaining our detection workflow as well as understanding SEKOIA.IO XDR history and specificities.

Read it later Remove

What's next

BlueFox Stealer: a newcomer designed for traffers teams

This blog post on BlueFox Stealer is an extract of the “FLINT 2022-053 – BlueFox Stealer: a newcomer designed...

Aurora: a rising stealer flying under the radar

SEKOIA.IO analysed Aurora in depth and share the results of our investigation in this article.

Lucky Mouse: Incident Response to Detection Engineering

This blogpost discusses how the Tactics, Techniques and Procedures (TTPs) used by the APT27 (Lucky Mouse) intrusion set in...

Comments are closed.