Home
Improving Threat Detection with Sigma Correlations

Improving Threat Detection with Sigma Correlations

Today, we are adding Sigma Correlations support to the SEKOIA.IO threat detection capabilities! In this post, we discuss what can be done with it, and why it was needed. Limitations of STIX and STIX Patterning When we first created our threat detection engine, we...
Lapsus$: when kiddies play in the big league

Lapsus$: when kiddies play in the big league

You may not have missed all the noises recently caused by Lapsus$, a group that seems to specialize in extortion without necessarily leveraging ransomware. At first glance, Lapsus$ check marks all elements that would make researchers put them in the low priority...

Invasion of Ukraine – what implications in cyberspace?

A first version of this blogpost was released as a FLINT (Flash Intelligence Report) by SEKOIA.IO Threat & Detection Research Team on February 16, 2022. This is an updated version, in light of the latest developments related to the invasion of Ukraine by Russia....

Log4Shell: the defender’s worst nightmare ?

[Since this post concerns a recently-published vulnerability, intelligence regarding latest research will be updated periodically]   On Thursday, December 9, 2021, a code execution vulnerability (dubbed Log4Shell and referenced as CVE-2021-44228) affecting the Java...

Walking on APT31 infrastructure footprints

November 10th, 2021 – SEKOIA.IO’s Cyber Threat Intelligence team had an in-depth look at  the APT31 intrusion set at the beginning of 2021 when the BfV (Bundesamt für Verfassungsschutz)¹ and McAfee² released some new information. A few months later, the...