Category: Exclude

Category: Exclude

How the Avira PE authentication leads to a Local Privilege Escalation (CVE-2019-18568)

by Nicolas Delhaye, Vulnerability Researcher CVE-2019-18568 impacts a kernel component of the Avira Free Antivirus software. The “avipbb.sys” driver is responsible for enhancing the local security. In this context, we will see that any executables started on the host machine will be examined from a kernel driver. Unfortunately, this component is prone to an integer

Who can help in times of cyber crisis?

In order to mitigate the consequences of a cyber attack and to assure the continuity of operations in case of cyber crisis, Airbus CyberSecurity has developed a Service Package that provides on-demand rapid intervention of cyber expertise associated with relevant on-demand cyber services. Airbus CyberSecurity has dedicated European-based cyber incident responders to help you thoroughly investigate

New EU Cyber Company Database coming soon

“If only I could quickly identify some truly European cyber companies for my project without spending days of research to do so.” Well, that will soon be possible thanks to a searchable database elaborated by the Airbus CyberSecurity and Atos Consortium. 550 companies, ranging from SMEs (small and medium-sized enterprises) to large enterprises have been

New Customer portal coming soon

Visibility, reliability, ease-of-use: a few ways to accurately describe the new customer portal; which contains the “Contract Management System” (CMS) as named in the EU Framework contract soon to be launched by Airbus CyberSecurity to replace the SharePoint Extent. The customer portal will combine the functionalities to end-to-end manage the Services Request initiated by/for the

Upcoming training of European Law Enforcement Agencies on the SIMARGL Project

SIMARGL is a European research project financed by the European Commission through the Grant Agreement 833042. It aims to provide innovative new advanced solutions to fight complex malwares effectively, including information-hiding-capable threats such as stegomalwares. Stegomalwares are a combination of information-hiding techniques like steganography, with a more common malware propagation method, used to distribute a

Recap on SP2 seminar series around CyberRange

Covid-19 is affecting all of our lives: both personal and professional. Many of us are missing out on direct interaction, particularly in areas of new and exciting technological interest. Beyond providing services and products upon EU-I requests, the Consortium is supporting more tactical or strategic topics. For this reason, we are happy to have been

Would you have guessed?

The Framework Contract has now been running for four years, delivering services and products to many of you. But do you know how many years are left? What about the total amount engaged by the EU-I? Or how many people of the Consortium work every day to meet your expectations? Read on to discover some

Remote working audits: Are you certain your remote workforce isn’t a threat?

Following nearly two years of widely enforced remote working (which may be set to continue in the future), now may be a good time to check whether your extended remote working environment represents a possible threat to your organisation. We have indeed witnessed an explosion of cyber crime during this period – from brute force

Emulate your adversaries: red teaming

“There are only two types of companies: those that have been hacked and those that will be hacked.” Robert S. Mueller III, former Director of the FBI In today’s world, many organisations understand that they must invest budget and resources to reduce risk and the potential business impact of a cyber attack. Yet no so

Back to top