Blog

Run your own local LLM with Ollama

AI

Ollama is an innovative tool designed to simplify the way you work with AI models on your local machine. Much like Docker revolutionized containerized applications, Ollama provides a seamless experience for downloading, managing, and running pre-trained AI models.

Read
CYLAB at the DIGILIENCE Conference

Conference Blockchain Cyber Situation Awareness

Members of the Cyber Defence Lab attended this year’s edition of the “Digital Transformation, Cybersecurity, And Resilience DIGILIENCE 2024” that was held in Sofia, Bulgaria. They presented two papers in the field of Blockchain and Cyber Situation Awareness in Complex Systems.

Read
NATO Winter Meeting "Visual Analytics for Complex Systems"

News Visual Analytics

This week we are pleased to host the winter meeting of NATO research group IST-184 “Visual Analytics for Complex Systems”. During 4 days participants from multiple NATO countries will exchange ideas and collaborate on topics like visual analytics for maritime operations, for cyber operations, COVID-19 and complex systems in general.

Read
Automatic Docker reverse-proxy with Traefik

Docker

Traefik is an open-source reverse proxy and load balancer designed specifically for container platforms like Kubernetes and Docker. In these environment, Traefik can automatically discover services, perform load balancing and configure SSL termination. In this post, we’ll show how to deploy and use Traefik on Docker.

Read
Battle ready!

News

This Tuesday 12 November, our students will participate in the TAM cyber challenge organized by Airbus.

Read
Cyber Awareness Game

News

Have you ever wondered why it’s important to have a “strong” password ? Why you should not share too much personal information on social media ? How to spot phishing mail ?

Read
Researcher in Cyberdefense (M/F/X): Project “ACRES”

Jobs News

In the framework of the study DAP23-02 “Autonomous Cyber Red Teaming System” (ACRES), we are looking for a full-time researcher in cyberdefense with a Bachelor, or a Master degree in Cybersecurity, Computer Science, or equivalent.

Read
Researcher in Cyberdefence (M/F/X): Project “ACTING"

Jobs News

In the framework of the study ACTING “Advanced European platform and network of Cybersecurity training and exercises centres”, we are looking for a full-time researcher in Cyberdefence with a Bachelor or a Master degree in Cybersecurity / in computer science, or equivalent.

Read
Harvesting PGP secret keys from poorly secured Thunderbird instance

Pentesting Teaching

If you’re privacy-conscious (which is great!) and have set up Thunderbird to use PGP for signing and encrypting your emails, you’ve likely taken important steps to ensure that no third party, including your email provider, can access your private communications. You probably followed an online tutorial to get it set up—but have you enabled a primary password?

Read
Install Autopsy on Linux and on the SIFT workstation

Forensics

Autopsy is an open-source digital forensics platform widely used for investigating and analyzing digital media, such as hard drives, memory cards, and smartphones. Developed by Basis Technology, it serves as the graphical front-end for The Sleuth Kit (TSK), a powerful collection of command-line tools for forensic analysis. It also includes additional tools like PhotoRec. Autopsy simplifies the forensic process by offering a user-friendly interface and features like timeline analysis, keyword searching, file carving, and metadata extraction.

Read
A brief overview of passkey

Teaching Phishing

You may have come across terms like “passkeys” or the intriguing idea of going “passwordless.” These concepts might sound confusing, especially since we’re all so used to securing everything with passwords—and constantly reminded of the importance of having strong ones. So, how could a world without passwords possibly be secure? In this blog post, we’ll explore this new method of authentication and break down how it works in a simple, easy-to-understand way. We won’t dive into the technical details, but you’ll get a clear overview of what passkeys are and how they can change the way we stay secure online.

Read
Create your own plugin for RegRipper

Forensics Windows Linux

RegRipper is a collection of powerful perl scripts that allow to dump the content of a registry hive file into readable text. RegRipper relies on a plugin mechanism. Hence in this post I will show how to create your own plugin for RegRipper. The example will be very basic, and will extract the value of the Current ControlSet.

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept