Nicolas Caproni (@ncaproni) 's Twitter Profile
Nicolas Caproni

@ncaproni

Head of @sekoia_io Threat & Detection Research (TDR) Team #SOCplatform #XDR #SIEM #CTI #TIP

ID: 179925427

linkhttps://linktr.ee/nicolas.caproni calendar_today18-08-2010 12:30:38

44,44K Tweet

7,7K Followers

4,4K Following

Sekoia.io (@sekoia_io) 's Twitter Profile Photo

🇰🇵 Sekoia #TDR team investigated a malicious campaign that employs fake job interview websites to deliver backdoors on Windows and macOS - #GolangGhost using #ClickFix tactic. Dubbed #ClickFake Interview, this campaign has been attributed to #Lazarus APT blog.sekoia.io/clickfake-inte…

🇰🇵 Sekoia #TDR team investigated a malicious campaign that employs fake job interview websites to deliver backdoors on Windows and macOS - #GolangGhost using #ClickFix tactic. Dubbed #ClickFake Interview, this campaign has been attributed to #Lazarus APT

blog.sekoia.io/clickfake-inte…
Sekoia.io (@sekoia_io) 's Twitter Profile Photo

🎉 It's not about a CTI investigation or a Detection Engineering topic, but today we are happy to announce that Sekoia.io has raised €26m! sekoia.io/en/presse/seko…

🎉 It's not about a CTI investigation or a Detection Engineering topic, but today we are happy to announce that Sekoia.io has raised €26m! 
sekoia.io/en/presse/seko…
Sekoia.io (@sekoia_io) 's Twitter Profile Photo

Since the apparition of the #Interlock ransomware, the Sekoia #TDR team observed its operators evolving, improving their toolset (#LummaStealer #BerserkStealer), and leveraging new techniques such as #ClickFix to deploy the ransomware payload. blog.sekoia.io/interlock-rans…

Since the apparition of the #Interlock ransomware, the Sekoia #TDR team observed its operators evolving, improving their toolset (#LummaStealer #BerserkStealer), and leveraging new techniques such as #ClickFix to deploy the ransomware payload. 

blog.sekoia.io/interlock-rans…
FIRST.org (@firstdotorg) 's Twitter Profile Photo

The 2025 Cyber Threat Intelligence Conference is LIVE on YouTube! Check out the content as it's being streamed out of Berlin, Germany for the first Plenary day of the conference at: youtube.com/live/2pSjbSx8J… #FIRSTCTI25 #CyberThreat #CTI

The 2025 Cyber Threat Intelligence Conference is LIVE on YouTube! Check out the content as it's being streamed out of Berlin, Germany for the first Plenary day of the conference at: youtube.com/live/2pSjbSx8J… #FIRSTCTI25 #CyberThreat #CTI
Sekoia.io (@sekoia_io) 's Twitter Profile Photo

Our new report describes one of the latest observed infection chains (delivering #AsyncRAT) relying on the #Cloudflare tunnel infrastructure and the attacker’s #TTPs with a principal focus on detection opportunities. blog.sekoia.io/detecting-mult…

Our new report describes one of the latest observed infection chains (delivering #AsyncRAT) relying on the #Cloudflare tunnel infrastructure and the attacker’s #TTPs with a principal focus on detection opportunities. 

blog.sekoia.io/detecting-mult…
CERT-FR (@cert_fr) 's Twitter Profile Photo

Le mode opératoire d’attaque APT28 a été utilisé contre de nombreuses entités des secteurs gouvernemental, diplomatique et de la recherche. Le CERT-FR publie un rapport identifiant des chaînes de compromission. cert.ssi.gouv.fr/cti/CERTFR-202…

LABScon (@labscon_io) 's Twitter Profile Photo

🚨🚨 We interrupt this post-RSA haze with a major announcement! The #LABScon25 CFP is officially open. Lock in and let's go! labscon.io/cfp/

Élysée (@elysee) 's Twitter Profile Photo

Quand l’unité européenne dérange, la désinformation va jusqu’à faire passer un simple mouchoir pour de la drogue. Cette fausse information est propagée par les ennemis de la France, à l’extérieur comme à l’intérieur. Vigilance face aux manipulations.

Quand l’unité européenne dérange, la désinformation va jusqu’à faire passer un simple mouchoir pour de la drogue.

Cette fausse information est propagée par les ennemis de la France, à l’extérieur comme à l’intérieur. Vigilance face aux manipulations.
Félix Aimé (@felixaime) 's Twitter Profile Photo

Excited to see this paper finally published! Meet #ViciousTrap, a threat actor compromising and turning edge devices into honeypots! blog.sekoia.io/vicioustrap-in…

Sekoia.io (@sekoia_io) 's Twitter Profile Photo

🪤 Sekoia #TDR's new exclusive research uncovers the #ViciousTrap, a honeypot network deployed on compromised edge devices. buff.ly/94StpGM

Volodymyr Zelenskyy / Володимир Зеленський (@zelenskyyua) 's Twitter Profile Photo

Today, a brilliant operation was carried out — on enemy territory, targeting only military objectives, specifically the equipment used to strike Ukraine. Russia suffered significant losses — entirely justified and deserved.

Sekoia.io (@sekoia_io) 's Twitter Profile Photo

📝 Our latest #TDR report delivers an in-depth analysis of Adversary-in-the-Middle (#AitM) #phishing threats - targeting Microsoft 365 and Google accounts - and their ecosystem. This report shares actionable intelligence to help analysts detect and investigate AitM phishing.

📝 Our latest #TDR report delivers an in-depth analysis of Adversary-in-the-Middle (#AitM) #phishing threats - targeting Microsoft 365 and Google accounts - and their ecosystem.

This report shares actionable intelligence to help analysts detect and investigate AitM phishing.
crep1x (@crep1x) 's Twitter Profile Photo

We are excited to share our latest blogpost on AitM phishing threats - covering common TTPs, the PhaaS ecosystem, the most widespread kits, and multiple detection opportunities! x.com/sekoia_io/stat… w/ Grégoire Clermont

Seongsu Park (@unpacker) 's Twitter Profile Photo

A team of Korean researchers has published crucial research analyzing vulnerabilities in financial security software widely used across South Korea. 📄 syssec.kaist.ac.kr/pub/2025/Too_M… While cybersecurity professionals have long been aware of these issues, this paper provides concrete