Blog

MARk: Visualizations with D3.js

MARk JavaScript APT Detection

Detecting suspicious or malicious activity in a network is not a trivial task. In recent years the attacks perpetrated have grown in sophistication and frequency. For this reason a new detection tool was developed, in the form of the Multi Agent Ranking framework (MARk). MARk sets the groundwork for the implementation of large scale detection and ranking systems through the implementation of a distributed storage in conjuncture with highly specialized, stand-alone detector agents. The detector agents are responsible for analyzing specific predefined characteristics and producing a report of any suspicious activity encountered.

Read
Secure your project with the GitLab SAST analyzers

Secure Software Development GitLab PHP Cyber-Wise

Learn how to secure any project with the GitLab SAST analyzers and easily separate the false positives from the real threats that should be addressed before deploying the project.

Read
Laravel database transactions & mysqldump

Laravel MySQL PHP Cyber-Wise

Did you know that mysqldump can create inconsistent backups if you do not use database transactions in Laravel? Let's discover that issue and address it in order to avoid it. After setting up and running locally a Laravel project that will serve as a demo for that specific issue, we will observe the necessity of using transactions and how to implement them. We'll also discover many more tips while trying to understand what happens under the MySQL hood.

Read
Configure rolling backups with rsnapshot

Sysadmin

In this blog post we show how to use rsnapshot to configure nice and easy rolling backups.

Read
Running and Imaging with FTK Imager from a flash device

Forensics Offensive Security

In the process of analyzing a suspicious machine, the first thing we need to do is to actually image the machine we want to investigate. There are different tools available to do this, but the one I most often use is FTK Imager by AccessData. The FTK Imager tool is easy to use and more importantly, there is a free version.

Read
Download BigBlueButton recordings as videos

Teaching

BigBlueButton is a great platform for online teaching. It has many features like built-in drawing tools (even supports multi-user drawing), breakout rooms, chat, shared notes, polling, screen sharing, session recording etc. But, the recorded sessions are no actual videos.

Read
We are looking for 2 new colleagues!

News Jobs

We are starting 2 new research projects:

Read
Log management with Loki : getting started

Monitoring DevOps

Loki is a log database developed by Grafana Labs. It's similar to Elasticsearch, with some major conceptual differences:

Read
What is a genetic algorithm (and how does it work)?

In the Machine Learning field, there are plenty of different algorithms. Each algorithm has its own advantages and drawbacks, its domains of application and its performance. One of these algorithms we heard the most about is the Genetic Algorithm.

Read
Email tracking techniques

Ever wondered how a company can track the opening of the emails it sends to its customers? Here you will learn to achieve that without using any third party email tracking service. All the techniques will be illustrated through Laravel code since all you need is a web server and a few scripts!

Read
SMS-based 2-Factor Authentication is insecure !

SS7

The US National Institute of Standards and Technology (NIST) has declared in its Digital Authentication Guideline that SMS-based two-factor authentication should be banned due to security concerns [End of SMS-based 2-Factor Authentication; Yes, It's Insecure!]. We explain why in this blog.

Read
ICONS2021 : Best paper award!

News

Our paper entitled Adversarial Training for Deep Learning-based Intrusion Detection Systems presented at the International Conference on Systesm (ICONS2021) has received the best paper award!

Read
This website uses cookies. More information about the use of cookies is available in the cookies policy.
Accept