Uncategorized

by mrahier96 mrahier96 No Comments

What is Format Preserving Encryption (FPE) ?

Format Preserving Encryption, named FPE from here, is a particular form of encryption with a constraint of preserving the initial format. In other words, the output should keep the same format as the input. The format of data can be defined by a charset (named the domain in the article below) and a length. Here are some examples:

  • A 16-digit card number in a 16-digit number.
  • A 12 Hexadecimal digit mac address in a 12 Hex digit number.
  • A mail address to another mail address.

Read more

by Excellium SA Excellium SA No Comments

Robots.txt & cybersecurity: Protecting your web applications from hackers

What is a Robots.txt file?

A robots.txt file is a simple text file that should be available at the root level of the application, like the one on the Excellium website. This file is here to allow or avoid the search engine robots to crawl some parts of the website.

For that example, the robots.txt file provides the website’s sitemap to help search engines browse all links more easily than browsing each page one by one and discovering links recursively. That also allows indexing the pages that don’t have external references to them. Read more

by Excellium SA Excellium SA No Comments

How to protect industrial assets with control access ?

As industrial IoT expands, equipment and systems are increasingly connected and must be protected from new digital threats. Without proper security, organizations can be infiltrated by hackers and terrorists, or simply left exposed by negligence.

Securing IT systems in industrial organizations is critical, and becoming more important daily as the digital transformation increasingly connects systems and equipment.

 

Read more

by Excellium SA Excellium SA No Comments

Abusing macro to get code execution from a Word document

In order to gain initial access as part of a red team exercise, phishing is a very popular approach. A convincing scenario must be found to entice the targets to download and run the malicious file on their laptop. Using a Word document with a macro that launches the malware is a good way to create a legitimate scenario and build target confidence. However, it is necessary to work ahead of time on the macro to avoid defensive measures. For the following, we will choose to target an up-to-date Windows 10 version with all default settings. We will then see what we need to do for our macro to be recognized as legitimate.

Read more

by Excellium SA Excellium SA No Comments

Continuous deployment: applying security for web application development

The rise of Continuous deployment

With the rise of the Continuous Deployment[1]https://www.atlassian.com/continuous-delivery/continuous-deployment activity, the frequency at which web applications (website, API, etc.) are deployed has significantly increased. Nowadays it is common to see companies deploying a new version of a web application several times a weeks/months[2]https://cloud.google.com/blog/products/devops-sre/another-way-to-gauge-your-devops-performance-according-to-dora.

Read more

by Excellium SA Excellium SA No Comments

Risks linked to external dependencies

Nowadays, most of the software is based on external components that are created and maintained by external entities. External components are also named “third-party” components and can be, for example, a library. The objective is, most of the time, to delegate specific operations to dedicated components. This facilitates the maintenance of the main application and lets the developers focus on the code providing the business features. The type of operation performed by a component can be, for example, Processing of specific file format, logging, handling of business data formats (e.g., SWIFT) and so on.

Read more

by Excellium SA Excellium SA No Comments

Cyber crisis management in 4 steps

In this article, we address cyber crisis management. Indeed, a cyber crisis is the consequence of one or more malicious actions taken on the information systems of an entity. They may have consequences that can be disastrous both financially and reputationally speaking.

Read more

by Excellium SA Excellium SA No Comments

24X7 Detection & Response with Excellium Services Belgium

In a world where technology prevails and exchanges and data storages are fully digitalized, cybersecurity is a key element in an organization’s resiliency.

Resiliency is the ability of organizations, relying more and more on computing tools, to “survive” in case of IT tools’ failures. Considering the current cyber threats, this aspect has never been so important and preoccupying for Security & IT Experts. In fact, Belgium registered a rise of 30% in cybercrimes between 2018 and 2O19 (source: ccb.belgium.be). Choosing the right cybersecurity partner is now a major challenge.

Read more

Top