Identifying Cybersecurity Anomalies with Risk Potential
When aiming to monitor an organization’s security 24/7, apart from breaches and attacks that are detected by existing tools, IT security specialists are interested in potential anomalies that seem transitory within IT systems. Sometimes such anomalies are just a random [...]
System dependency workshop in Larissa and Rome – Context and procedures
In October this year we concluded the third round of a series of three one week long systems and dependency analysis workshops. A one week long workshop was held in Larissa and in Rome, with the purpose of identifying potentially [...]
Who does my Android phone tell about me? Looking at the BLOKADA log file
Blokada is a program, which sets itself up as a VPN. Think of a VPN like a street your data passes through before entering the highway of the Internet. Blokada looks for traffic to and from addresses related to advertising [...]
InnoSec presents CS-AWARE in the FOSSCOMM 2018 conference
InnoSec participated in the FOSSCOMM (Free and Open Source Software Communities Meeting) 2018 conference that took place on Crete island, Greece between the 13th and 14th of October 2018. FOSSCOMM is the Panhellenic conference of free and open source software [...]
The market for cybersecurity is very active
The market for cybersecurity is currently very active, and especially companies that are providing services in the detection and reaction phases of the cybersecurity cycle are a hot commodity right now. According to a recent article in TechCrunch, within one [...]
Sigma language rules for SIEM
Motivated by the sudden growth of interest in Security Information and Event Management (SIEM)mechanisms worldwide, companies that develop cybersecurity products started building their own SIEMsolutions as soon as possible. Due to market share competition, each of these companies developedtheir own [...]
A skeptical view…
Just a thought, as we look at other possible competitors, etc. in cybersecurity, it’s best not to forget and keep a skeptical view of many “commercial” claims. Read –and enjoy! – this latest report from ProPublica, an independent and nonprofit [...]
B as Baltimore (or Brussels…)
Sometimes we also ourselves think if what we are building in the CS-AWARE project is really useful and what someone may consider as “bare necessities” for a local public administration, or only some forward-looking, nice-to-have “stuff” which may better be [...]
Business and corporate users: better move to Linux!
A recent article in Forbes reveals one of the latest cyber security incidents detected by Kaspersky, namely a malware disguised as a legitimate security update. Kaspersky called this attack as "one of the biggest supply-chain incidents ever." “The motivations for [...]