General

by sarahxlm sarahxlm No Comments

Armacell: Speeding Up Incident Response and Recovery with Azure Sentinel

Armacell: Speeding Up Incident Response and Recovery with Azure Sentinel

Armacell is a global manufacturing company, providing flexible insulation foams for the equipment insulation market. As a growing company relying increasingly on the cloud, they need fortifying their defence against security threats. As part of that initiative, they needed a partner that could manage threat identification and incident response with them — and that’s where Excellium came in. Building their solution on Azure Sentinel, Excellium will help Armacell with a cost-effective approach to event collection and collation, threat detection, incident investigation, and rapid response. Read on for the details. Read more

by mathildeexlm mathildeexlm No Comments

The art of hiding secrets in plain sight with base64 padding steganography

The technique of hiding information in public data is called steganography. The Base64 encoding uses 0-padding when encoding data. It is possible to hide information in this padding, as it is disregarded upon decoding. For efficiently hiding larger amounts multiple strings need to be encoded as one Base64-encoded string can contain 4, 2 or 0 bits of secret text. This article explains the technique, provides a python code for hiding and retrieving the information and shows performance information about the method.

Read more

by mathildeexlm mathildeexlm No Comments

What are HermeticWiper & IsaacWiper?

Imagine waking up one day to find that all your important data, such as photos and documents, has been erased with no way to restore them. A scary thought, right? As technology evolves, so does the way we store valuable data. Let’s face it, users do not keep a hard copy of every photo or document they have on their computer. With their busy daily routines, people are so used to storing data on electronic devices for quick access.

The problem is that few users are in the habit of keeping backups, especially on a separate device such as a portable hard drive or USB stick. By not preparing for the worst, they become the perfect victims of a Wiper malware attack.

Read more

by mathildeexlm mathildeexlm No Comments

Mobile Device Management or Mobile Application Management?

Nowadays and even before the pandemic, mobile devices have become an integral part of the business world as every employee owns a smartphone and companies depend mainly on the use of laptops, smartphones, and tablets to handle day-to-day business tasks ranging from critical to mundane. The pandemic only accelerated this digital transformation towards more Cloud environments. But what about security risks and constraints?

Read more

by mathildeexlm mathildeexlm No Comments

How to bypass some security features by reversing a Xamarin application

Threats for Mobile applications

As web and desktop applications, mobile applications also bring several threats that could lead to the data used by the application being compromised or even go further if the attacker is able to find information about the back-end system.

In practice, the application should ensure that the data stored on the device is securely stored and that the network traffic cannot be intercepted in order to read information. In addition, if the data are sensitive, like in banking applications, the application should ensure that the device is compliant with the vendor’s security rules. In fact, the application should check if the device is rooted for Android systems or jailbroken for iOS systems. Plus, the application should also check if it was altered or running in debug mode. If these checks are not made, the data used by the application could be prone to attackers in case of the installation of an application containing malware.

Read more

by mathildeexlm mathildeexlm No Comments

The importance of information security risk management

Risk management is the angular stone of many organizations’ decisional processes. However, information security risk management can sometimes be forsaken. Even though it’s not just about information technology, cyber-risk management is one of the most important risks, and business consequences are behind any cybersecurity incident. That is to say, information security risk management is an important process for all types and sizes of organizations. Implementation of effective risk management allows organizations to help reach their objectives and moreover to define their security strategies.

Read more

by mathildeexlm mathildeexlm No Comments

24X7 Detection & Response with Excellium Services Belgium

In a world where technology prevails and exchanges and data storages are fully digitalized, cybersecurity is a key element in an organization’s resiliency.

Resiliency is the ability of organizations, relying more and more on computing tools, to “survive” in case of IT tools’ failures. Considering the current cyber threats, this aspect has never been so important and preoccupying for Security & IT Experts. In fact, Belgium registered a rise of 30% in cybercrimes between 2018 and 2O19 (source: ccb.belgium.be). Choosing the right cybersecurity partner is now a major challenge.

Read more

by Excellium SA Excellium SA No Comments

Excellium Services and BitSight: which level of control do you have on your cybersecurity supply chain?

Contern – Luxembourg, 19th October 2021

Organizations are used to conduct mature processes to onboard a third-party, through sourcing, procurement, or vendor management. However, such processes do not often cover the long-term perspective and controls about any change that may occur within their partners. Manual interactions with the third-parties have an expensive cost and require staff that are focused on other concerns. Evaluation of the cybersecurity posture of third parties do not diverge from that trend. However, as a breach in a supplier’s Information System may have a huge impact on your own, how to conciliate a proper risk assessment and agility in an ever-growing interconnected world?

Read more

by Excellium SA Excellium SA No Comments

Access the potential of the cloud to enhance global security

With its Excellium360 for Office 365 & Azure offering, the BELUX cybersecurity specialist provides its customers with access to advanced security features, such as Microsoft’s SIEM “Sentinel” solution. Integrated with Excellium’s Security Operations Center, it enables the cybersecurity of IT environments deployed both on-premises and in the cloud to be reinforced. Read more

Top