David Bizeul (@davidbizeul) 's Twitter Profile
David Bizeul

@davidbizeul

Pragmatic Security enthusiast - CSO @sekoia_io - Tweets are my own

ID: 73972542

linkhttps://fr.linkedin.com/in/bizeul calendar_today13-09-2009 20:53:53

381 Tweet

1,1K Followers

40 Following

David Bizeul (@davidbizeul) 's Twitter Profile Photo

Related to our #NOBELIUM publication last week, Here is the graph view for those of you with visual cognitive skills! This is done using #STIX sekoia.io/en/nobeliums-e…

Related to our #NOBELIUM publication last week, Here is the graph view for those of you with visual cognitive skills!
This is done using #STIX
sekoia.io/en/nobeliums-e…
Félix Aimé (@felixaime) 's Twitter Profile Photo

Keep calm and read this: Sekoia.io’s TDR team view on the recent events – Invasion of Ukraine 🇺🇦– what implications in cyberspace? ↘️ sekoia.io/en/invasion-of…

David Bizeul (@davidbizeul) 's Twitter Profile Photo

Very proud of the engineering team to make it real and working in real time on every incoming event. Whenever a rule is triggered, it leverages #ThreatIntel to display relevant context for SOC analysts or MSSPs

David Bizeul (@davidbizeul) 's Twitter Profile Photo

Really happy to go to #Botconf2022 this week for nice talks. I will be there with some colleagues from Sekoia.io. See you there / DM to sync.

Sekoia.io (@sekoia_io) 's Twitter Profile Photo

Today we are announcing the availability of the SEKOIA.IO Cyber Threat Intelligence #CTI into Microsoft Sentinel 🚀 techcommunity.microsoft.com/t5/microsoft-s…

Today we are announcing the availability of the SEKOIA.IO Cyber Threat Intelligence #CTI into Microsoft Sentinel 🚀 techcommunity.microsoft.com/t5/microsoft-s…
David Bizeul (@davidbizeul) 's Twitter Profile Photo

We all want to have an impact with our actions: - If you are on the event, on booth E85, we speak all in one #SOCplatform and associated cool stuff (#XDR #CTI #TIP). - If you don't have time, follow us on linkedin.com/company/sekoia/, we'll fund @timeforplanet for each subscription

David Bizeul (@davidbizeul) 's Twitter Profile Photo

I really love this blogpost which illustrate the fundamentals of rule creation in a modern #SOC today for #threat detection

David Bizeul (@davidbizeul) 's Twitter Profile Photo

⚡️Hey, this is big news! Remember, Sekoia.io is a #SOCplatform with an #XDR approach. To get Detection really eXtended, we need smart rules and we have(#CTI and #sigma). But to onboard our customer faster, our own smart collector was necessary too. Our R&D team worked on that 🚀

David Bizeul (@davidbizeul) 's Twitter Profile Photo

Transparency is a key-driver for us. Knowing what is done in your #SOCplatform is essential. Of course, activities of your users are recorded, but also your MSSP users working in your tenant, and even our TDR(Threat Detection &Research) Team if you authorise so #fulltransparency

David Bizeul (@davidbizeul) 's Twitter Profile Photo

That's really cool to have such a team (Threat Detection & Research team) internally. They work on cyber hot topics and transform it in multiple stuff: reports, detection rules, IOCs and CTI relationships, customer notifications, LE interactions, tech sharing. Huge impact! 🥰👏✨

The Shadowserver Foundation (@shadowserver) 's Twitter Profile Photo

As of end of last week, we are sharing IPs of PlugX infected machines in our daily sinkhole reports thanks to collaboration with Sekoia.io shadowserver.org/what-we-do/net… Background at blog.sekoia.io/unplugging-plu… Dashboard stats for 2024-05-06 (~9K hosts daily): dashboard.shadowserver.org/statistics/com…

As of end of last week, we are sharing IPs of PlugX infected machines in our daily sinkhole reports thanks to collaboration with <a href="/sekoia_io/">Sekoia.io</a>  shadowserver.org/what-we-do/net…

Background at blog.sekoia.io/unplugging-plu…

Dashboard stats for 2024-05-06 (~9K hosts daily): dashboard.shadowserver.org/statistics/com…
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

I have tested and added the #YARA rules by Sekoia.io to the YARA Forge project YARA Forge automates the collection, standardization, and optimization of high-quality YARA rules from public repositories, providing security teams with reliable, ready-to-use rule packages

I have tested and added the #YARA rules by <a href="/sekoia_io/">Sekoia.io</a> to the YARA Forge project

YARA Forge automates the collection, standardization, and optimization of high-quality YARA rules from public repositories, providing security teams with reliable, ready-to-use rule packages