CONCORDIA Blog
Do you need a cyber range? The KYPO Cyber Range Platform is now available for free
Yes, it is true. We release the KYPO Cyber Range Platform (KYPO CRP) as open-source software to help develop cybersecurity skills in Europe. This activity aims to help solve the problem of many lacking cybersecurity experts by providing a platform for training, development, and execution. The release of an open-source...
Read More(Emerging) digital identity models and their impact on user-centric security
According to Kim Cameron[1](Chief Architecture of Identity from 2004 to 2019 at Microsoft), the Internet - as we know it today, was built without an identity layer. Moreover, the World Wide Web inventor, Tim Berners-Lee, recently started a new project named Solid[2], to radically change how the Internet works today...
Read MoreCybersecurity in the financial sector – part II
In our last post about Cybersecurity in the Financial Sector we presented some of the main threats to which the financial services entities are exposed, and we concluded about the relevance of cyber-threat intelligence (CTI) sharing tools in order to react fast to several types of cyber-attacks that can affect...
Read MoreHow 5G can leverage Cyber Threat Intelligence
Cellular mobile networks have evolved across five generations starting from analogue voice-centric services, going through IP-based mobile services and, today, we stand before the 5th generation that supports various industry vertical use cases requiring enhanced mobile broadband, massive IoT and critical communications. Along with each generation, the threat surface has...
Read MoreMake Digital Work, not just Function
Security, Privacy, Trust & Trustworthiness, by Design Misalignment Nr. 1 There still is huge misalignment between the economics of selling technology, products, systems and services, and the economics of security, privacy, trust and trustworthiness. On that, the Head of Europol's Cybercrime Centre (EC3), Steve Wilson, for instance stated the following:...
Read MoreIntegration of MISP into Flowmon ADS
In this document, we will describe the integration of the MISP platform and the Flowmon Anomaly Detection System. The purpose of this integration is to automatically detect a threat in the network using indicators of compromise provided via an instance of the MISP platform connected to Flowmon. One of the...
Read MoreWork in Progress: the CONCORDIA Platform for Threat Intelligence
Our first steps to improve Europe’s information position in cybersecurity We present CONCORDIA’s vision for a cross-sector, pan-European platform for collecting, analyzing, and sharing threat intelligence, which combines datasets built up in different parts of the project. What is threat intelligence? Threat intelligence can be defined as the process of...
Read MoreFalse Flags in Cyber Threat Intelligence Operations
Like “fake news” also in the security world there is the risk of “false flags”. There are tons of information in the form of paid and OSINT (Open Source Intelligence) feeds that enrich and add value to any indicators used to protect the networks. It is relatively easy to inject...
Read MoreMalware analysis: a successful cooperation between Cyber-Detect and Lorraine University
The Europol annual the Internet Organised Crime Threat Assessment (IOCTA) [1] states that known malware threats are always active and that new threats are appearing. Ransomware are still one of the major causes of cyber-attacks, but more targeted attacks seems to more profitable for cyber-criminals. That is the collaboration between...
Read MorePreparing to fight Cyber Threats – The Human aspect
It is news to no one that everyday organizations experience incidents related to Cybersecurity. Cyber threats follow an increasing progression for the last five years. What can organizations do in order to be better prepared and more resilient? Having identified this rising threat, in the last years organizations have started...
Read More