Here is a quick wrap-up from Heidelberg (Germany) where was organized the 9th edition of the TROOPERS conference. Unfortunately, due to an agenda conflict (my bad!), I was not able to attend the first day and just joined the conference this morning for the second day of talks. Here is
Running MISP in a Docker Container
MISP (“Malware Information Sharing Platform“) is a free software which was initially created by the Belgian Defence to exchange IOC’s with partners like the NCIRC (NATO). Today it became an independent project and is mainly developed by a group of motivated people. MISP is mainly used by CERT’s (“Computer Emergency Response
How to Not Send Corporate Emails?
On a daily basis, I’m looking for malicious emails. I own catch-all mailboxes that collect a huge amount of spam that I’m using to perform deeper analysis: to discover new tactics used by attackers and new piece of malicious code. Basically, they are two categories of phishing campaigns: the one sent to
Incident Handling with Docker Containers
Honestly, I never really played with Docker but… For a few weeks, I succumbed to the temptation of playing with Docker thanks to a friend who’s putting everything in docker containers. If you still don’t know Docker, here is a very brief introduction: Docker lets you run applications in a “container“. In this
[SANS ISC Diary] Reducing False Positives with Open Data Sources
The following diary was published on isc.sans.org: Reducing False Positives with Open Data Sources
[SANS ISC Diary] Hunting for Executable Code in Windows Environments
The following diary was published on isc.sans.org:Â Hunting for Executable Code in Windows Environments.
[SANS ISC Diary] More Malicious JavaScript Obfuscation
The following diary was published on isc.sans.org: More Malicious JavaScript Obfuscation.
The Best Broth is Made in The Oldest Pot
In 2014, I blogged about security awareness through proverbs. Many proverbs can be used to deliver important security messages. We are now in 2016 and I could add a new one to the long list that I already built: “The Best Broth is Made in The Oldest Pot“ A new
[SANS ISC Diary] Automating Vulnerability Scans
The following diary was published on isc.sans.org: Automating Vulnerability Scans.
[SANS ISC Diary] Scripting Web Categorization
The following diary was published on isc.sans.org: Scripting Web Categorization.