November 13, 2020

Do you need a cyber range? The KYPO Cyber Range Platform is now available for free

Yes, it is true. We release the KYPO Cyber Range Platform (KYPO CRP) as open-source software to help develop cybersecurity skills in Europe. This activity aims to help solve the problem of many lacking cybersecurity experts by providing a platform for training, development, and execution. The release of an open-source...

Read More
November 5, 2020

(Emerging) digital identity models and their impact on user-centric security

According to Kim Cameron[1](Chief Architecture of Identity from 2004 to 2019 at Microsoft), the Internet - as we know it today, was built without an identity layer. Moreover, the World Wide Web inventor, Tim Berners-Lee, recently started a new project named Solid[2], to radically change how the Internet works today...

Read More
October 22, 2020

Cybersecurity in the financial sector – part II

In our last post about Cybersecurity in the Financial Sector we presented some of the main threats to which the financial services entities are exposed, and we concluded about the relevance of cyber-threat intelligence (CTI) sharing tools in order to react fast to several types of cyber-attacks that can affect...

Read More
October 15, 2020

How 5G can leverage Cyber Threat Intelligence

Cellular mobile networks have evolved across five generations starting from analogue voice-centric services, going through IP-based mobile services and, today, we stand before the 5th generation that supports various industry vertical use cases requiring enhanced mobile broadband, massive IoT and critical communications. Along with each generation, the threat surface has...

Read More
October 8, 2020

Make Digital Work, not just Function

Security, Privacy, Trust & Trustworthiness, by Design Misalignment Nr. 1 There still is huge misalignment between the economics of selling technology, products, systems and services, and the economics of security, privacy, trust and trustworthiness. On that, the Head of Europol's Cybercrime Centre (EC3), Steve Wilson, for instance stated the following:...

Read More
October 1, 2020

Integration of MISP into Flowmon ADS

In this document, we will describe the integration of the MISP platform and the Flowmon Anomaly Detection System. The purpose of this integration is to automatically detect a threat in the network using indicators of compromise provided via an instance of the MISP platform connected to Flowmon. One of the...

Read More
September 24, 2020

Work in Progress: the CONCORDIA Platform for Threat Intelligence

Our first steps to improve Europe’s information position in cybersecurity We present CONCORDIA’s vision for a cross-sector, pan-European platform for collecting, analyzing, and sharing threat intelligence, which combines datasets built up in different parts of the project. What is threat intelligence? Threat intelligence can be defined as the process of...

Read More
August 13, 2020

False Flags in Cyber Threat Intelligence Operations

Like “fake news” also in the security world there is the risk of “false flags”. There are tons of information in the form of paid and OSINT (Open Source Intelligence) feeds that enrich and add value to any indicators used to protect the networks. It is relatively easy to inject...

Read More
August 6, 2020

Malware analysis: a successful cooperation between Cyber-Detect and Lorraine University

The Europol annual the Internet Organised Crime Threat Assessment (IOCTA) [1] states that known malware threats are always active and that new threats are appearing. Ransomware are still one of the major causes of cyber-attacks, but more targeted attacks seems to more profitable for cyber-criminals. That is the collaboration between...

Read More
July 30, 2020

Preparing to fight Cyber Threats – The Human aspect

It is news to no one that everyday organizations experience incidents related to Cybersecurity. Cyber threats follow an increasing progression for the last five years. What can organizations do in order to be better prepared and more resilient? Having identified this rising threat, in the last years organizations have started...

Read More
1 5 6 7 8 9 12