General

by mathildeexlm mathildeexlm No Comments

SIEM vs SOC vs CFC: What is the difference?

In today’s article, we discuss SIEM, SOC and CFC.

Cyber threats have grown significantly over the last decade. From simple malware to complex advanced persistent threat groups. Threat actors have progressed significantly, they are constantly improving their methods and techniques to breach security controls causing massive damage and disruptions.

Read more

by mathildeexlm mathildeexlm No Comments

Armacell: Speeding Up Incident Response and Recovery with Azure Sentinel

Armacell: Speeding Up Incident Response and Recovery with Azure Sentinel

Armacell is a global manufacturing company, providing flexible insulation foams for the equipment insulation market. As a growing company relying increasingly on the cloud, they need fortifying their defence against security threats. As part of that initiative, they needed a partner that could manage threat identification and incident response with them — and that’s where Excellium came in. Building their solution on Azure Sentinel, Excellium will help Armacell with a cost-effective approach to event collection and collation, threat detection, incident investigation, and rapid response. Read on for the details. Read more

by mathildeexlm mathildeexlm No Comments

The art of hiding secrets in plain sight with base64 padding steganography

The technique of hiding information in public data is called steganography. The Base64 encoding uses 0-padding when encoding data. It is possible to hide information in this padding, as it is disregarded upon decoding. For efficiently hiding larger amounts multiple strings need to be encoded as one Base64-encoded string can contain 4, 2 or 0 bits of secret text. This article explains the technique, provides a python code for hiding and retrieving the information and shows performance information about the method.

Read more

by mathildeexlm mathildeexlm No Comments

What are HermeticWiper & IsaacWiper?

Imagine waking up one day to find that all your important data, such as photos and documents, has been erased with no way to restore them. A scary thought, right? As technology evolves, so does the way we store valuable data. Let’s face it, users do not keep a hard copy of every photo or document they have on their computer. With their busy daily routines, people are so used to storing data on electronic devices for quick access.

The problem is that few users are in the habit of keeping backups, especially on a separate device such as a portable hard drive or USB stick. By not preparing for the worst, they become the perfect victims of a Wiper malware attack.

Read more

by mathildeexlm mathildeexlm No Comments

Mobile Device Management or Mobile Application Management?

Nowadays and even before the pandemic, mobile devices have become an integral part of the business world as every employee owns a smartphone and companies depend mainly on the use of laptops, smartphones, and tablets to handle day-to-day business tasks ranging from critical to mundane. The pandemic only accelerated this digital transformation towards more Cloud environments. But what about security risks and constraints?

Read more

by mathildeexlm mathildeexlm No Comments

How to bypass some security features by reversing a Xamarin application

Threats for Mobile applications

As web and desktop applications, mobile applications also bring several threats that could lead to the data used by the application being compromised or even go further if the attacker is able to find information about the back-end system.

In practice, the application should ensure that the data stored on the device is securely stored and that the network traffic cannot be intercepted in order to read information. In addition, if the data are sensitive, like in banking applications, the application should ensure that the device is compliant with the vendor’s security rules. In fact, the application should check if the device is rooted for Android systems or jailbroken for iOS systems. Plus, the application should also check if it was altered or running in debug mode. If these checks are not made, the data used by the application could be prone to attackers in case of the installation of an application containing malware.

Read more

by mathildeexlm mathildeexlm No Comments

The importance of information security risk management

Risk management is the angular stone of many organizations’ decisional processes. However, information security risk management can sometimes be forsaken. Even though it’s not just about information technology, cyber-risk management is one of the most important risks, and business consequences are behind any cybersecurity incident. That is to say, information security risk management is an important process for all types and sizes of organizations. Implementation of effective risk management allows organizations to help reach their objectives and moreover to define their security strategies.

Read more

by mathildeexlm mathildeexlm No Comments

24X7 Detection & Response with Excellium Services Belgium

In a world where technology prevails and exchanges and data storages are fully digitalized, cybersecurity is a key element in an organization’s resiliency.

Resiliency is the ability of organizations, relying more and more on computing tools, to “survive” in case of IT tools’ failures. Considering the current cyber threats, this aspect has never been so important and preoccupying for Security & IT Experts. In fact, Belgium registered a rise of 30% in cybercrimes between 2018 and 2O19 (source: ccb.belgium.be). Choosing the right cybersecurity partner is now a major challenge.

Read more

Top