Implementing a VPN throught text files

During our last audit, we encountered a network architecture that aroused our curiosity. The architecture was composed of two segregated networks. Those two networks completely separated but could both access a storage filesystem replicated in both networks by a central… Continue Reading →

Squid + Kerberos authentication

If you have had trouble getting Squid transparently authenticate your Windows users from an Active Directory source using Kerberos, getting error messages such as: ERROR: Negotiate Authentication validating user. Error returned ‘BH received type 1 NTLM token’ … check your… Continue Reading →

Malware Analysis - GTHROTROW.EXE

At the beginning of February, we received a strange business proposal by email. The email seemed authentic, so did the attachment, until we noticed something was wrong. Email attachment Despite the Adobe Acrobat icon, the attachment of the email is… Continue Reading →

Back to the future: evil doc files from the 90’s are back

Last week, one of our clients has been the victim of a large number of attacks through emails. Those messages contained a word file as attachment. In this article, we will quickly describe how to set up a safe environment to control the behavior… Continue Reading →

Job opportunity in ICS Cyber Security Asia, Middle East or Europe

Secway & Beijaflore is expanding in the Middle East and Asia Secway & Beijaflore, French leading consortium in the Cyber Security, with a workforce of more than 100 experts, is expanding activity in the Middle East and Asia on Control… Continue Reading →

The Secway Quarantine Station

An attempt at securing the perimeter of critical infrastructures. Introduction As today’s Industrial Control Systems rely mostly on Microsoft Windows-based workstations and servers, the use of Removable Media - such as USB flash drives or CD/DVD - has become increasingly… Continue Reading →