Filter by category:

  • April 16, 2017 by Peter Stiehl
    • Audit
    • RetExp
    • ShadowBrokers
    Dans la boite à outils d'Equation Group

    A peek view in the Equation Group toolbox

    This article aims to introduce the framework that has been disclosed through an article posted by ShadowBrokers, focusing on two tools, FuzzBunch and DanderSpritz, and their associated modules....
  • April 16, 2017 by Nicolas Kovacs
    • Audit
    • RetExp
    • ShadowBrokers

    Data analysis of the Shadow Brokers leak

    The purpose of this blogpost is to drill down a first analysis of the data provided by The Shadow Brokers Friday, April 14th 2017, and to highlight the level of potential threat towards every user...
  • January 9, 2017 by Christophe Baland
    • Cybersecurity
    • IoT

    Threats of connected objects: issues and possibilities

    Introduction The hyper-connectivity of today's society involves new threats and scenarios of attacks. The Internet of Things thus raises new challenges in terms of security which must be taken...
  • October 15, 2016 by Christophe Baland
    • Cybersecurity
    • GSMA
    • IoT
    • Recommandations

    GSMA's IoT security guidelines overview

  • September 12, 2016 by Lény Bueno
    • Hardware
    • IoT
    Lény Bueno

    Embedded devices and hardware security - introduction

    This article introduces a series of blog posts dealing with embedded systems security. This set of articles will mainly focus on Hardware but may also concern software security (e.g. firmware) or...
  • September 12, 2016 by Julia Juvigny
    • Cybersecurity
    • FIC
    Compte-rendu du FIC 2016

    Report of the 8th International Cyber Security Forum

    « For great aims we must dare great things ». This reference to the essay of military strategy On war, written by Carl von Clausewitz, sums up the "war-like" atmosphere which prevailed during the...
  • September 12, 2016 by Nha-Khanh Nguyen
    • IoT
    • Health
    Nha-Khanh Nguyen

    Healthcare, connected people

    21st century, technology is everywhere. Connecting your watch or you toothbrush is becoming part of your daily life. Put all these connected objects together and you will have the Internet of Things...
  • September 12, 2016 by Jérôme Richard
    • CISO
    • Cybersecurity
    • Digital transformation
    Jérôme Richard

    From CISO to Digital risks director

    CISO Role and responsibility Organization's Chief Information Security Officer (CISO) is defined by the CIGREF in "nomenclature des métiers 2015" as being in charge with "[the definition of] the...
  • September 12, 2016 by Christophe Baland
    • Cryptography
    • Hardware
    • IoT

    Mobile phones and encryption

    News has recently bring attention on mobile phones encryption policies, particularly through the Apple vs. FBI case. The FBI unsuccessfully tried to force the firm to decipher the phone used by a...
  • September 12, 2016 by Julia Juvigny
    • Cybersecurity
    • ENISA
    • Smart Home
    Julia Juvigny

    Smart home security : Overview of ENISA's report

    Defined by ENISA as a space integrating interconnected smart devices and systems, the smart home is the direct successor of home automation systems. A market that is expected to generate a turnover...
  • September 12, 2016 by Peter Stiehl
    • ctf
    • ndh2k16
    • ssrf
    • Write-Up
    Peter Stiehl

    Write-Up: Todo Rename The Service Name (300 points)

    This challenge has been created for the public wargame of the Nuit Du Hack 2016 event and has not been resolved. This is a write-up written by the creator of the challenge. We need to retrieve the...
  • September 12, 2016 by Florent Poulain
    • Anti-Virus
    • Bypass
    • Evasion
    • PDF
    • Signature
    Florent Poulain

    Bypassing antivirus detection on a PDF exploit

    Every pentester has one day grappled with an antivirus blocking his tools, be it for a pentest, a phishing campaign, a security awareness demonstration, and so on. Several Internet resources present...