News
Sekoia reports an important change for known ransomware actors leveraging extortion impacting the financial sector, such as BianLian: They have shifted to an exfiltration-based extortion without ...
Freddy Milesi, CEO of Sekoia.io mentions: "Since the public launch of our platform in 2020, Sekoia.io’s technology has proven its worth to the security teams of major CAC40 companies, ...
PARIS — Sekoia.io, developer of the Sekoia AI-SOC platform, announces it has raised 26 million euros from Revaia, with participation from UNEXO and the support of its existing investors Bright Pixel ...
Sekoia.io is a European cybersecurity firm based in France, that deeply understands XDR's promise for third-party in. Recently, Frost & Sullivan assessed the extended detection and response ...
In late February 2025, TechRadar Pro reported Sekoia was warning about a botnet named PolarEdge, using the same vulnerability to target a range of devices from Cisco, ASUS, QNAP, and Synology.
Sekoia.io, a European cybersecurity technologies provider and developer of the Sekoia AI-SOC platform, announces it raised 26 million euros from Revaia, ...
Image: Sekoia. 911 infection chain used by traffers. What malware is used by traffers? The most used information stealing malware used by traffers, as observed by Sekoia, are Redline, Meta ...
Want to keep yourself abreast with the latest news and developments from Sekoia.io? Find an exclusive listing of Sekoia.io news on SourceSecurity.com - your complete guide to the security industry.
Sekoia said the threat actors dropped separate malware on the Windows and MacOS systems. Windows users were targeted with Stealc and Rhadamanthys, while Mac users were infected by AMOS stealer, ...
Sekoia has uncovered several other malware distribution clusters beyond Google Meet. These include platforms like Zoom, PDF readers, fake video games (such as Lunacy, Calipso, ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results