I published the following diary on isc.sans.edu: “My Little DoH Setup“: “DoH”, this 3-letters acronym is a buzzword on the Internet in 2019! It has been implemented in Firefox, Microsoft announced that Windows will support it soon. They are pro & con about encryptingÂ DNS requests inÂ Â HTTPS but it’s not the
I published the following diary on isc.sans.edu: ““Lost_Files” Ransomware“: Are good old malware still used by attackers today? Probably not running the original code but malware developers areâ€¦ developers!Â They donâ€™t reinvent the wheel and re-use code published here and there. I spotted aÂ ransomware which looked like an old one… [Read
I published the following diary on isc.sans.edu: “Phishing Attack Through Non-Delivery Notification”: Here is a nice example of phishing attack that I found while reviewingÂ data captured by my honeypots. We all know that phishing is a pain and attackers are always searching for new tactics to entice the potential victimÂ to
And the conference is over! I’m flying back to home by tomorrow morning so I’ve time to write my third wrap-up. The last day of the conference is always harder for many attendees due to the late parties. But I was present on time to attend the last set of
I’m just back from the reception that was held at the CitÃ© de l’Espace, such a great place with animations and exhibitions of space related devices. It’s tie for myÂ wrap-up of the second day. This morning, after some coffee refill, the first talk of the day was performed by Jose
Here is my first wrap-up for the 6th edition of the Botconf security conference. Like the previous editions, the event is organized in a different location in France. This year, the beautiful city of Toulouse saw 400 people flying from all over the world to attend the conference dedicated to
I’m writing this quick wrap-up in Vienna, Austria where I attended my first DeepSec conference. This event was already on my schedule for a while but I never had a chance to come. This year, I submitted a training and I was accepted! Good opportunity to visit the beautiful city
Passive DNS is not a new technique but, for the last months, there was more and more noise around it. Passive DNS is a technique used to record all resolution requests performed by DNS resolvers (bigger they are, bigger they will collect) and then allow to search for historical data.
During this summer, I went to SANSFire, DefconÂ and BSidesLV. Usually, the month of September is lighterÂ without big events for me. This is to prepare for the next wave of conferences ahead! Of course, BruCON will be held on the first week of October but, especially,Â Hack.luÂ which remains one of my favourite
I’m proud to have been selected to give a training at DeepSecÂ (Vienna, Austria) in November: “Hunting with OSSEC“. This training is intendedÂ for Blue Team members and system/security engineers who would like to take advantage of the OSSEC integration capabilities with other tools and increase the visibility of their infrastructure behaviour.