Cybersecurity
Cybersecurity
DDoS attacks in Luxembourg in 2024
Discover the statistics of DDoS attacks detected in Luxembourg in 2024 by POST Cyberforce.
Read this article
Author
Paul FelixPublished on
01 February 2024
How can we spot a deepfake?
Artificial intelligence and deep learning technologies now make it possible to create content from scratch, featuring real people with a very high degree of realism. And with these so-called deepfakes, new risks are emerging. How can you guarantee the authenticity of an image or video? How can you tell the difference between what’s real and what’s not? What can be done to combat the spread of counterfeit content? For several years, POST Luxembourg – in partnership with the University of Luxembourg – has been working on these issues, and they’re more prevalent than ever.
Read this article
Author
Cu NguyenPublished on
30 January 2024
Preventing DDoS attacks by blocking illegitimate traffic
The number of so-called Denial of Service (DDoS) attacks in Luxembourg is increasing month after month. Cybercriminals are hijacking connected devices to send illegitimate traffic to organisations and saturate connections. These attacks have the effect of degrading the level of service or paralysing the business. To help Luxembourg businesses protect themselves against these attacks, POST has solutions for blocking illegitimate traffic (in real time if needed) before it reaches the organisation's systems.
Read this article
Author
Paul FelixPublished on
19 December 2023
Cyberscore: the Security Rating for SMEs in Luxembourg
A Cyberscore is an initiative developed by POST and Luxcontrol to help small and medium-sized companies in Luxembourg tackle cybersecurity issues more easily.
Read this article
Author
Marion CuisinierPublished on
24 October 2023
October, European Cybersecurity Month.
To inaugurate European Cybersecurity Month, ENISA (the European cybersecurity agency) published an article in September 2023 highlighting the risks of increased phishing linked to new technologies that are likely to grow between now and 2030.
Read this articleAuthor
Fanny NganPublished on
17 October 2023
The essential evolution of SOCs towards a hybrid mode
With the constant evolution of digital environments, POST is transforming its SOC into a hybrid by combining several technological advances.
Read this article
Author
Dylan DintransPublished on
08 August 2023
Searching for vulnerabilities in IoT devices: Case of CVE-2022-46527 (Part 2)
This article is the second part of case study CVE-2022-46527 and will discuss the discovery of the vulnerability and a proof of concept leading to a crash
Read this articlePublished on
26 June 2023
Searching for vulnerabilities in IoT devices: Case of CVE-2022-46527 (Part 1)
Setting up the environment to scan IoT devices for vulnerabilities: Case of CVE-2022-46527
Read this articlePublished on
14 March 2023
DDoS attacks in Luxembourg in 2023
Discover the statistics of DDoS attacks detected in Luxembourg in 2023 by POST Cyberforce.
Read this article
Author
Paul FelixPublished on
15 February 2023
20,000 phishing SMS posing as Guichet.lu detected in one week
In recent weeks, an extensive SMS phishing campaign has targeted Luxembourg mobile numbers, pretending to be the Public Administration citizens’ portal.
Read this article
Author
Cu NguyenPublished on
19 January 2023
Dealing with increasingly frequent DDoS attacks
When targeted by volumetric attacks, Luxembourg organisations can quickly find themselves paralysed, and literally cut off from the internet
Read this article
Author
Paul FelixPublished on
29 November 2022
DDoS attacks in Luxembourg in 2022
Discover the statistics of DDoS attacks detected in Luxembourg in 2022 by POST Cyberforce.
Read this article
Author
Paul FelixPublished on
11 October 2022
Exploiting CVE-2018-5093 on Firefox 56 and 57 – PART2: gaining code execution
How to exploit the vulnerability in Firefox 56 and 57 to get code execution
Read this articlePublished on
19 September 2022
Cybersecurity weather forecast – 2nd quarter 2022
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
16 August 2022
The POST CyberForce big interview
“The most striking event of 2021 was undoubtedly the reporting and malicious exploitation of the log4j vulnerability.”
Read this article
Author
Marion CuisinierPublished on
19 July 2022
Cybersecurity: peace of mind with the POST SOC
Using a Security Operations Centre (SOC) allows organisations to constantly monitor activity on their IT systems so as to take quick and effective action in the event of an attack or anomaly.
Read this article
Author
Alan OlszewskiPublished on
12 July 2022
Exploiting CVE-2018-5093 on Firefox 56 and 57 – PART1: controlling the instruction pointer
Find out how to take advantage of the whole underflow vulnerability on Firefox 56 and 57
Read this articlePublished on
04 July 2022
Cybersecurity weather forecast – 1st quarter 2022
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
19 May 2022
Simulate attacks on telecom networks to better protect them
Telecoms networks are the target of increasingly frequent attacks by malicious actors seeking to hijack them or intercept communications.
Read this article
Author
Alexandre De OliveiraPublished on
19 April 2022
Preventing risky connections with DNS protection
Faced with a variety of cyber threats, organisations now have an opportunity to strengthen their security with a DNS protection solution and ensure the legitimacy of business-related traffic.
Read this articleAuthor
Béatrice SeiwertPublished on
22 March 2022
Adversary simulation exercise: when real-life meet business
This article is short story telling about one adversary simulation exercise we (POST CyberForce Offensive Security) performed.
Read this articlePublished on
08 March 2022
Cybersecurity weather forecast – 4th quarter 2021
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
22 February 2022
Cybersecurity weather forecast – 3rd quarter 2021
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
30 November 2021
Securing endpoints in the age of remote working
How can organisations protect against threats when the IT environment is more open, employees are working remotely, and there is a greater range of employee devices (workstation, mobile or tablet) in play?
Read this article
Author
PitPublished on
18 October 2021
DDoS attacks in Luxembourg in 2021
Discover the statistics of DDoS attacks detected in Luxembourg in 2021 by POST Cyberforce.
Read this article
Author
Paul FelixPublished on
30 September 2021
iOS Wi-Fi Demon: From iOS Format String to Zero-Click RCE
You might have seen the recent bug in iOS 14.0 to 14.4, that crashed the Wi-Fi service by naming an access point a specific way. Apple tagged this bug as a Denial of Service on the Wi-Fi service, but the Zecops [1] Research Team has shown proofs that it could be exploited, causing an RCE, and more precisely a Zero-Click RCE.
Read this articlePublished on
07 September 2021
Cybersecurity weather forecast – 2nd quarter 2021
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
17 August 2021
Anatomy of a Red-Team exercise - Chapter 3
As discussed in previous scenario, we prepared several raspberry devices with a 4G modem, allowing us to remotely control the device without requiring being in proximity for operation.
Read this articlePublished on
29 June 2021
Cybersecurity weather forecast – 1st quarter 2021
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incidences
Read this article
Author
PitPublished on
11 May 2021
Anatomy of a Red-Team exercise - Chapter 2
Prior any actions, we focused on the payload crafting that will be used with our attack scenarios. We decided to go for PowerShell stageless reverse HTTPS payload that will be delivered using HTA dropper and then executed on the target machine.
Read this articlePublished on
20 April 2021
Anatomy of a Red-Team exercise - Chapter 1
A Red Team engagement can be shortly described as a real-life targeted attack simulation. As a threat actor, it uses a blended approach through several facets of social engineering, physical intrusion, application/network penetration testing, targeted phishing campaign… simultaneously to reach some pre-defined objectives.
Read this articlePublished on
22 March 2021
Making room for women in cybersecurity
To mark International Women’s Day, we’re offering you an opportunity to meet Aurélie Da Silva, Information Security Officer at POST Luxembourg.
Read this article
Author
PitPublished on
08 March 2021
Cybersecurity weather forecast – 4th quarter 2020
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incid
Read this article
Author
PitPublished on
25 February 2021
Cybersecurity: how to reduce false positives
Increased scrutiny of network infrastructure has sent the number of security alerts skyrocketing. However, IT teams have a tendency to ignore these alerts amid so much crying wolf, and this poses a critical security risk to their business.
Read this article
Author
Dylan DintransPublished on
04 February 2021
Cybersecurity weather forecast – 3rd quarter 2020
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
10 November 2020
How do correlation strategies work within an SOC?
Phishing, ransomware… cyber-attacks against businesses have surged this year. To protect against them, more and more businesses are choosing to set up an SOC: Security Operations Centre.
Read this article
Author
Alan OlszewskiPublished on
20 October 2020
The human factor is a key to cybersecurity strategy
Companies need to protect their information, whether physical or digital. Moreover, threats do not come from outside the company alone. Internal threats are all too real, and all too often overlooked.
Read this article
Author
PitPublished on
15 July 2020
Cybersecurity weather forecast – 2nd quarter 2020
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
08 July 2020
Cybersecurity weather forecast – 1st quarter 2020
Each quarter, POST's CyberForce team describes its perception of the level of cyber threat, based on its security incident management process.
Read this article
Author
PitPublished on
18 May 2020
Make the SOC more efficient with the help of an orchestrator
With any cyber threat, a rapid response is essential. The use of an orchestrator at the SOC, based on the automation possibilities offered, makes it easier to monitor alerts and take quicker decisions when facing a cyber risk.
Read this article
Author
Thomas ProfetaPublished on
01 January 1970
Contact us
Do you have any questions about an article? Do you need help solving your IT issues?
Contact an expert







Our experts answer your questions
Do you have any questions about an article? Do you need help solving your IT issues?