October 1, 2020

Integration of MISP into Flowmon ADS

In this document, we will describe the integration of the MISP platform and the Flowmon Anomaly Detection System. The purpose of this integration is to automatically detect a threat in the network using indicators of compromise provided via an instance of the MISP platform connected to Flowmon. One of the...

Read More
September 24, 2020

Work in Progress: the CONCORDIA Platform for Threat Intelligence

Our first steps to improve Europe’s information position in cybersecurity We present CONCORDIA’s vision for a cross-sector, pan-European platform for collecting, analyzing, and sharing threat intelligence, which combines datasets built up in different parts of the project. What is threat intelligence? Threat intelligence can be defined as the process of...

Read More
August 13, 2020

False Flags in Cyber Threat Intelligence Operations

Like “fake news” also in the security world there is the risk of “false flags”. There are tons of information in the form of paid and OSINT (Open Source Intelligence) feeds that enrich and add value to any indicators used to protect the networks. It is relatively easy to inject...

Read More
August 6, 2020

Malware analysis: a successful cooperation between Cyber-Detect and Lorraine University

The Europol annual the Internet Organised Crime Threat Assessment (IOCTA) [1] states that known malware threats are always active and that new threats are appearing. Ransomware are still one of the major causes of cyber-attacks, but more targeted attacks seems to more profitable for cyber-criminals. That is the collaboration between...

Read More
July 30, 2020

Preparing to fight Cyber Threats – The Human aspect

It is news to no one that everyday organizations experience incidents related to Cybersecurity. Cyber threats follow an increasing progression for the last five years. What can organizations do in order to be better prepared and more resilient? Having identified this rising threat, in the last years organizations have started...

Read More
July 23, 2020

Opportunistic Cyber Threats in a Time of Pandemic

The Coronavirus pandemic has spread globally in a matter of weeks, infecting hundreds of thousands while catching the medical community by surprise. While we know where the pandemic originated, we still know very little about cures, treatments, or even a way to immunize patients from it. However, two things also...

Read More
July 16, 2020

SURF’s TAO approach to Cybersecurity

Good things come in threes SURF is the "collaborative organisation for ICT in Dutch education and research", we also operate the Dutch NREN (National Research and Education Network). With ICT so prominent in our one-liner description you might think that we love technology (and you would be right!), but we...

Read More
July 9, 2020

Threat Intelligence and Operation Resilience

Leveraging Threat Intelligence for proactive defences The COVID-19 is forcing organisations around the world to adopt "work-from-home" or telecommuting. This paradigm shift is putting immense pressure on cybersecurity operations. As organisations are making extraordinary efforts to protect their workers and serve their customers during the pandemic, exposure to cyberthreats is...

Read More
July 2, 2020

COVID-19, Telecommuting and Threat Intelligence

How threat actors are abusing the global pandemics In response to the COVID-19 pandemic, organisations around the world decide to adopt telecommuting. With the communication increasing due to working from home policies, threat actors are taking advantage and are even using the novel coronavirus as a lure to mount attacks....

Read More
June 25, 2020

Securing the sky

Unoccupied aerial systems (UAS) - colloquially referred to as ‘drones’ - are increasingly being deployed for a plethora of military and civil applications as well as for entertainment. This is a major challenge for the defence and aeronautical industry, as those vehicles need to be integrated into an already congested...

Read More
1 4 5 6 7 8 10