secwise.be | As the leading Microsoft Security team in Belgium and the premier Microsoft Gold Security Partner in BeLux , we offer a comprehensive end- to -end security strategy designed to protect your organization from cyber threats , malicious attacks, data breaches , and potential organizational harm . | threat malicious, malicious attack | security, microsoft, cloud, azure, cyber | 3 |
atbash.be | …forget to include some code and a short description of the problem so that the client knows what went wrong. Without giving away too many details of the internals of your application in case a malicious user tries to figure out your application by sending random or incorrect requests on purpose. | application malicious, malicious request, hint malicious, malicious user, case malicious | kotlin, token, framework, runtime, example | 3 |
dju.be | ??? Malicious Malicious CSV CSV text text files files used used to to install install BazarBackdoor BazarBackdoor malware | suspect malicious, malicious ips, malicious csv | photography, youtube, light, photographer, lightroom | 2 |
iseecure.be | Preset Remediations: Remove malicious presence and activity with pre-built actions for hosts, files, users and network. | host malicious, malicious file, remediation malicious, malicious presence | response, security, remediation, soc, detection | 2 |
homepharma.be | Be very careful when you receive any of these file types: .zip, .doc, .xls, .pdf, .7z. These are the most common file types used to spread malicious attachments. | type malicious, malicious attachment | money, attachment, file, awareness, program | 2 |
skalvaro.be | Norwich University students joined with Respond Software at the College Football Playoff National Championship at Levi’s Stadium. (Courtesy Respond Software) The College Football Playoff National Championship at Levi’s Stadium on Monday was a winning day for the cybersecurity world monitoring… | servers malicious, malicious http, world malicious, malicious threat | ago, month, security, late, network | 2 |
copasec.be | …track user behavior and improve their products. They also use this data to determine whether a device has been compromised by malware or other malicious software. Mobile Application Security zapewnia bezpieczne środowisko do rozwoju firmy Sprostanie wyzwaniom stojącym przed twórcami aplikacji… | malware malicious, malicious software | difference, ready, fun, finally, anyways | 1 |
revisat.be | The website is protected against Ddos attacks, malicious bots and malware by firewall and web application firewall. | attack malicious, malicious bot | research, sale, host, lead, generation | 1 |
spinae.be | Technologies like Network Intrusion Detection Systems (NIDS), Host Intrusion Detection Systems (HIDS), Endpoint Detection and Response (EDR), … allow to identify signs of possible malicious activity within your network, servers and computers. | possible malicious, malicious activity | security, ot, guidance, penetration, manage | 1 |
keyboardwarrior.be | Found a malicious file? We can investigate the contents and help figure out what the attackers intententions. | | warrior, keyboard, security, native, language | 1 |
bodin.be | …that your company information will end up in the hands of others. Think of files such as photos, contracts, letters and personnel files, but also credit card details or passwords of customers. You can also be unknowingly redirected to malicious websites that impersonate, for example, your own bank. | unknowingly malicious, malicious website | bodin, network, store, happy, secure | 1 |
pecky.be | My main focus of research is the study of adversarial examples. Broadly speaking, adversarial examples are input samples deliberately crafted by a malicious adversary in order to obtain certain specific predictions from a targeted machine learning model. The intent here is usually to cause some… | deliberately malicious, malicious adversary | jonathan, research, example, learn, teach | 1 |
quentinkaiser.be | I always worked for the red team but as I was going through my spam folder this morning I decided I’d give a try at analyzing malicious attachments. I also secretly always wanted to check out Didier Stevens’ oledump tool so this was a good excuse :) | try malicious, malicious attachment | room, conference, thing, vulnerability, execution | 1 |
teledinet.be | …track user behavior and improve their products. They also use this data to determine whether a device has been compromised by malware or other malicious software. Mobile Application Security zapewnia bezpieczne środowisko do rozwoju firmy Sprostanie wyzwaniom stojącym przed twórcami aplikacji… | malware malicious, malicious software | ready, fun, finally, employee, consumer | 1 |
lachambreduropieur.be | Ropieur: a malicious and goodhumoured street kid, basically a good little guy who expects the walker to splash him. | ropieur malicious, malicious goodhumoured | room, house, breakfast, friendly, walker | 1 |
hunna.be | The heart of the system is our terminal, designed to securely scan and copy files from uncertain portable media. Our system will minimize the risks associated with malicious code damaging or spreading through the IT-system via portable media, regardless of the infection being antagonistic or by… | risk malicious, malicious code | system, usb, sanitation, threat, security | 1 |
ifbseminars.be | …distribute any material which consists of (or is linked to) any spyware, computer virus, Trojan horse, worm, keystroke logger, rootkit or other malicious computer software. You must not conduct any systematic or automated data collection activities (including without limitation scraping, data… | rootkit malicious, malicious computer | ifb, seminar, course, material, health | 1 |
keysec360.be | Detects successful and unsuccessful logins outside the expected countries, known malicious IP addresses and adversaries, exposing unauthorized authentication activity. | country malicious, malicious ip | security, vulnerability, package, continuous, endpoint | 1 |
computer-solution.be | Threats such as malicious code, computer hacking and denial-of-service attacks have become more common, ambitious and sophisticated. Making implementing, maintaining and updating information security in an organisation more of a challenge. | threat malicious, malicious code | theme, startup, knowledge, infrastructure, security | 1 |
hcsbvba.be | HCS uses technical security precautions to protect your data from manipulation, loss, destruction or access by unauthorized persons. Our infrastructure ensures continuous protection of data against all threats, including viruses and other types of malicious code. We use threat detection systems… | type malicious, malicious code | hcs, purpose, law, user, access | 1 |
alarmsolutions.be | Protect yourself from burglary and malicious intrusion attempts with our range of high security wired and hybrid intruder alarm systems. | burglary malicious, malicious intrusion | system, detection, security, fire, control | 1 |
ubicon.be | …track user behavior and improve their products. They also use this data to determine whether a device has been compromised by malware or other malicious software. Mobile Application Security zapewnia bezpieczne środowisko do rozwoju firmy Sprostanie wyzwaniom stojącym przed twórcami aplikacji… | malware malicious, malicious software | personally, difference, ready, fun, employee | 1 |
kizombalovefunctionaltherapy.be | The IP address of visitors, the ID of logged-in users and the identifiers of log-in attempts are conditionally recorded to check for malicious activity and to protect the site against specific types of attacks. Examples of conditions when logging in include: login attempts, logout requests… | conditionally malicious, malicious activity | therapy, functional, health, medicine, care | 1 |
benedictelemmelijn.be | up, covered up or at best trivialised. It is of the utmost importance to realise that people have different sensitivities, and that even without malicious intent, certain comments or a certain tone of speech can touch, harm or even break people in their individuality. Open, transparent, unambiguous | sensitivity malicious, malicious intent | faculty, leadership, great, dean, task | 1 |
freedownloads.be | …options to better manage your saved data. Whether you are a business or personal user, it is essentia... lees meer Virus scanners Nowadays you have to ensure your online safety. For example, take measures against malicious people who try to obtain your data. The use of the online lands... lees meer | measure malicious, malicious people | program, browser, game, lot, great | 1 |
bcsr.be | The threats to society are very diverse, especially if they are the result of malicious intent from a state- or non-state based adversary. The ways to protect and restore society are also very diverse: they require actions in various domains… | result malicious, malicious intent | readiness, societal, security, society, course | 1 |
rbfa.be | …personal data, e.g. your IP-address, using technology such as cookies to store and access information on your device in order to serve personalized ads and content, ad and content measurement, audience insights and product development. You have a choice in who uses your data and for what purposes. | | consent, purpose, select, expiry, device | 0 |
shortu.be | ShortURL allows to reduce long links from Instagram, Facebook, YouTube, Twitter, Linked In and top sites on the Internet, just paste the long URL and click the Shorten URL button. On the next screen, copy the shortened URL and share it on websites, chat and e-mail. After shortening the URL, check… | report malicious, malicious url | url, click, twitter, button, screen | 0 |