xid.be | Bron: 5 phases of a cyber attack: The attacker’s view | Business Security Insider by F-Secure | attack attacker, attacker view, mission attacker, attacker financial, secretary attacker | attack, secure, cyber, target, detection | 15 |
wannacry.be | Note that the initial spreading did not take place via exploits from the Shadow Brokers leak of NSA tools. Compared to WannaCry, spreading takes place on the internal network, once the attackers already had a foothold in the network of the victim. | network attacker, attacker foothold, chain attacker, attacker point, scenario attacker | network, file, attack, advice, help | 4 |
skalvaro.be | In a water scarce country, like South Africa, smart metering can be a utility’s best ally in the fight to preserve water and promote conservation. However as the adoption of Advanced Metering Infrastructure (AMI) becomes more widespread, its appeal to cyber attackers is expected to increase. | exploitation attacker, attacker arbitrary | ago, month, cyber, network, late | 4 |
dietervandenbroeck.be | When something is publicly available on the internet, many types of attackers will try to find and exploit a vulnerability. By looking at logs it might be possible to determine if the attacker is just a script kiddie or a professional security researcher.… | type attacker, attacker vulnerability, possible attacker, attacker script | attack, domain, awareness, trust, disclosure | 4 |
quentinkaiser.be | This report outlines the VOOdoo vulnerabilities found in NETGEAR CG3100 and CG3700B cable modems provided by VOO to its subscribers. These modems use a weak algorithm to generate default WPA2 pre-shared keys, allowing an attacker in reception range of a vulnerable modem to derive the WPA2… | vulnerability attacker, attacker unauthorized, key attacker, attacker reception, remote attacker | conference, thing, vulnerability, execution, remote | 3 |
iseecure.be | Remediations of infected hosts, malicious files, compromised user accounts and attacker-controlled traffic. | environment attacker, attacker presence, account attacker, attacker traffic | response, detection, attack, remediation, file | 2 |
belgium2210.be | All units are removed from the territory. As Evacuation is played during an attack, the attacker can take the territory without any problem. | attack attacker, attacker territory | territory, card, space, risk, player | 2 |
self-defence.be | Many techniques are beautiful and fun in a sporting atmosphere or with an eye to imitating and exploring traditional styles, but are not usable on the street. Other techniques are way too complex or won't work against an experienced attacker (or under increased stress and anxiety!). | inexperienced attacker, attacker false, experience attacker, attacker stress | lesson, self, defence, course, woman | 2 |
iconbjj.be | BJJ was developed to allow people to effectively defend themselves against larger opponents or attackers. | | class, icon, kid, intermediate, advanced | 1 |
phlox-security.be | Do you ever wonder what a real attacker could exploit in your environment, what data he could get his hands on or which systems he could compromise? During a penetration test we think and act like a hacker to show you just that. After testing a report is delivered with detailed information about… | real attacker, attacker environment | consulting, penetration, environment, process, attack | 1 |
stephaneestival.be | How to identify vulnerabilities on your network ? You could use the Nessus vulnerability scanning software to identify vulnerabilities, policy-violating configurations and malware that attackers use […] | | network, linux, vulnerability, workstation, file | 1 |
aranhabelgium.be | In Brazilian Jiu-Jitsu a smaller, weaker person with the right techniques and movements can defend themselves against a stronger, bigger attacker. | | person, strong, movement, weak, control | 1 |
homepharma.be | Anyone can create a fictitious d-emails thread with the names of other company employees or representatives. This is an easy way for the attacker to make the e-mail more legitimate. Don't blindly trust emails, as anything in them can be made up. | way attacker, attacker mail | money, attachment, file, awareness, program | 1 |
tommybaert.be | If the malicious attacker does not know the WordPress administrator username, he has to guess both the username and password during a brute force attack. This means that the chances that the attack will succeed are much less and the attack will take much longer to complete, and the longer the… | malicious attacker, attacker wordpress | pi, raspberry, network, key, february | 1 |
it-lines.be | Protect your company’s intellectual property and guarantee continued productivity with Enterprise digital security. IT Lines offers security configurations to harden your existing systems and security auditing to verify the effectiveness from digital attackers. | | line, organization, israeli, iranian, bug | 1 |
ista-webportal.be | Currently, we do not yet know what data the attackers obtained or what data has been accessed. All current information on the current status of the investigation and answers to the most important questions can be found here, which we are continuously updating, as soon as new information arises. | data attacker, attacker data | password, currently, manual, profile, external | 1 |
nemsreviews.be | …they interrupt the abduction of the wolfābut canāt stop blood from being shed. Now Charles and Anna must use their skillsāhis as enforcer, hers as peacemakerāto track down the attackers, reopening a painful chapter in the past that springs from the darkest magic of the witchbornā¦ | enforcer attacker, attacker painful | book, list, currently, latest, reader | 1 |
amtal.be | Maximization of these valuable log traces to create dashboards, identify clipping levels and spot attackers is a complex task. And it doesn't stop there; once identified, you need to react in a prompt and efficient manner. Via Security Monitoring and Incident Response practice, we aim to bring… | level attacker, attacker complex | control, operation, integration, governance, risk | 1 |
cybereyes.be | …applications, computer systems, and networks. Our manual testing process goes beyond automated scanning and into complex security exploitation. Gain a thorough understanding of these vulnerabilities and begin to remediate the issues before an attacker is able to interrupt your business operations. | issue attacker, attacker able | technology, manage, threat, safety, need | 1 |
spinae.be | Did a cyber incident take place? Spinae helps you gather evidence and analyze compromised hosts for traces of the attacker. | | assessment, guidance, network, mri, manage | 1 |
antwerpshield.be | An active shooter incident is a situation where one or multiple people attack as much bystanders as possible. The attacker... | | shield, antwerp, share, terrorism, network | 1 |
hact.be | The IT security landscape is evolving constantly and attackers are more and more into the human aspects. This is why we need to boost our defense by focusing on the human and teaching people how to react. Our security awareness program teaches employees how to behave securely both at work and at… | constantly attacker, attacker human | human, awareness, cyber, threat, technical | 1 |
corelan.be | iOS Browsers & UIWebview iOS is very popular (according to StatCounter, it’s the 3rd most popular platform used). Mobile browsers take about 20% to 25% of the market share. iOS offers integration with desktop browsers and cloud (so the same data is available to an attacker). Many 3rd party IOS… | available attacker, attacker party | exploit, research, class, write, available | 1 |
shodokanaikido.be | aikido. Aikido is one of many martial arts, and in my personal opinion, perhaps the most balanced of them all. It strives to bring balance to the practitioner, to help them understand that combat does not need to be destructive and that it can be stopped without any pain to the attacker or defender. | pain attacker, attacker defender | history, japanese, difference, meditation, august | 1 |
focalpoint-sprl.be | We’re in this business because we’re passionate about it. We care about stopping advanced attackers through our innovation, our technology, our intelligence and our expertise. | advanced attacker, attacker innovation | cyber, advanced, industry, practical, academia | 1 |
madshrimps.be | Samsung has disclosed another cybersecurity incident. While an intrusion earlier this year led to hackers getting their hands on Galaxy source code, this time around, attackers obtained some customers' personal information. Go To Full Article | time attacker, attacker customer | memory, modde, power, silicon, rocket | 1 |
arcadebelgium.be | Bombergirl Rainbow starts operation today. In this update, a new Bombergirl is introduced: Platinum (Bomber type), she can hold a lot of bombs. There is a total of 22 girls already available: 6 Bomber, 5 Attacker, 6 Shooter and 5 Blocker. The online battle maps from the console version are added:… | bomber attacker, attacker shooter | permalink, author, list, song, picture | 1 |
stresscoach.be | (1) Cortisol amps up the appetite for quick energy (namely, carbohydrates and sugar), triggering cravings and overeating. (2) Cortisol also puts excess glucose in the bloodstream. When it’s not burned off through exercise (the equivalent of sprinting away from or fighting off the perceived… | away attacker, attacker gets | october, response, heart, pressure, blood | 1 |
keyboardwarrior.be | Found a malicious file? We can investigate the contents and help figure out what the attackers intententions. | | native, language, infrastructure, react, bug | 1 |
larsveelaert.be | Test your application for security issues to prevent unauthorized actions that attackers can exploit. | | ipsum, sit, consectetur, amet, dolor | 1 |
susceptor.be | "By manipulating the state of a TCP connection, an attacker could force the TCP connection to remain in a long-lived state, possibly indefinitely. If enough TCP connections are forced into a long-lived or indefinite state, resources on a system under attack may be consumed, preventing new TCP… | connection attacker, attacker tcp, vulnerability attacker, attacker able | vulnerability, tcp, patch, cisco, fix | 1 |
safepoint.be | It showcases actual attacks against a fictional company and is meant to raise awareness by walking in the shoes of an attacker, see the techniques and tools they use through his eyes and witness how he achieves his objectives. | shoe attacker, attacker technique | awareness, career, response, cyber, industry | 1 |
kennytordeur.be | Cross-Site Request Forgery (CSRF) Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated. CSRF attacks specifically target state-changing requests, not theft of data, since the attacker has no… | data attacker, attacker way | august, january, profile, view, june | 1 |
ilvodiagnosecentrumvoorplanten.be | The Diagnostic Centre for Plants (DCP) , part of Flanders Research Institute for Agriculture, Fisheries and Food (ILVO), is the premiere laboratory for plant health in Flanders. Wherever the presence of a plant disease or pest is suspected, be it in plants and vegetal products, soil or water… | plant attacker | analysis, sample, price, list, soil | 0 |
wpsol.be | Excepteur sint occaecat cupidatat non proident, sunt in culpa qui officia deserunt mollit est laborum. Aenaen massa, Cum soolis natoque penatibus et magnis dis parturient montes nascetur ridiculus mus | | parturient, nascetur, penatibus, natoque, mollit | 0 |
xmconsulting.be | Enrich internal data and log files with threat intelligence feeds in order to better detect security incidents. | | cyber, threat, asset, learn, remediation | 0 |