During our last audit, we encountered a network architecture that aroused our curiosity. The architecture was composed of two segregated networks. Those two networks completely separated but could both access a storage filesystem replicated in both networks by a central… Continue Reading →
If you have had trouble getting Squid transparently authenticate your Windows users from an Active Directory source using Kerberos, getting error messages such as: ERROR: Negotiate Authentication validating user. Error returned ‘BH received type 1 NTLM token’ … check your… Continue Reading →
At the beginning of February, we received a strange business proposal by email. The email seemed authentic, so did the attachment, until we noticed something was wrong. Email attachment Despite the Adobe Acrobat icon, the attachment of the email is… Continue Reading →
Last week, one of our clients has been the victim of a large number of attacks through emails. Those messages contained a word file as attachment. In this article, we will quickly describe how to set up a safe environment to control the behavior… Continue Reading →
Secway & Beijaflore is expanding in the Middle East and Asia Secway & Beijaflore, French leading consortium in the Cyber Security, with a workforce of more than 100 experts, is expanding activity in the Middle East and Asia on Control… Continue Reading →
An attempt at securing the perimeter of critical infrastructures. Introduction As today’s Industrial Control Systems rely mostly on Microsoft Windows-based workstations and servers, the use of Removable Media - such as USB flash drives or CD/DVD - has become increasingly… Continue Reading →