I’m in Washington DC at the SANSFIRE event. I’m following a training and meeting fellow SANS ISC Handlers. I also gave a talk tonight about the risks of the Internet of Things and quick tips to protect your home network against their invasion. Here is a copy of the slides: Link: http://www.slideshare.net/xme/home-sweet-home-sansfire-edition.
Category: Security
[SANS ISC Diary] Offensive or Defensive Security? Both!
I published the following diary was published on isc.sans.org:Â Offensive or Defensive Security? Both!
[SANS ISC Diary] Docker Containers Logging
I published the following diary was published on isc.sans.org: Docker Containers Logging.
The Impact of a Ransomware Infection
For a while, ransomware is a plague… Just by surfing to a website or by opening an invoice received by email, people get a nice popup window while their files are being encrypted. Everyday, we hear about nightmare stories with companies infected by such malicious code and which do not have a
Running MISP in a Docker Container
MISP (“Malware Information Sharing Platform“) is a free software which was initially created by the Belgian Defence to exchange IOC’s with partners like the NCIRC (NATO). Today it became an independent project and is mainly developed by a group of motivated people. MISP is mainly used by CERT’s (“Computer Emergency Response
How to Not Send Corporate Emails?
On a daily basis, I’m looking for malicious emails. I own catch-all mailboxes that collect a huge amount of spam that I’m using to perform deeper analysis: to discover new tactics used by attackers and new piece of malicious code. Basically, they are two categories of phishing campaigns: the one sent to
Incident Handling with Docker Containers
Honestly, I never really played with Docker but… For a few weeks, I succumbed to the temptation of playing with Docker thanks to a friend who’s putting everything in docker containers. If you still don’t know Docker, here is a very brief introduction: Docker lets you run applications in a “container“. In this
The Best Broth is Made in The Oldest Pot
In 2014, I blogged about security awareness through proverbs. Many proverbs can be used to deliver important security messages. We are now in 2016 and I could add a new one to the long list that I already built: “The Best Broth is Made in The Oldest Pot“ A new
[SANS ISC Diary] Automating Vulnerability Scans
The following diary was published on isc.sans.org: Automating Vulnerability Scans.
The Truth is in Your Logs!
Keeping an eye on logs is boring… but mandatory! Hopefully, sometimes it can reveal funny stuffs! It looks like people at the CCC are having some fun too while their annual conference is ongoing… Here is what I got in my Apache logs this morning: 151.217.177.200 – – [30/Dec/2015:06:51:22 +0100]