cyber
incident
response
CONTACT US

Over three decades in risk management we protect businesses end-to-end.

Our ambition is to help deliver products, solutions and services and support in shaping our collective future. We make our clients’ worlds safe, secure and sustainable.

Driven by expertise and innovation, we’re helping to build a better and more trusted future for everyone.

We know your business environment, we speak your language and we understand your challenges. Our experts have the insights to make your business safe, secure and sustainable while preparing you for a decarbonised future.

Bringing together outstanding experience to support our clients 

35+ years
of cross-industry engineering and business experience
We’ve been successfully protecting our clients’ businesses for more than three decades, making us a trusted partner in safety, security and sustainability.
50+
ongoing
R&D and R&T projects
We have a proven track record in innovation, research & development, as well as research & technology. Protecting the future is in our DNA.
300+
customers
trust us
We collaborate and protect businesses from threats and risks. We ensure a safe, secure and sustainable future.

What's new?

Filter
Blog Airbus protect

Applying a Stuxnet Type Attack to a Modicon PLC (CVE-2020-7475)

This study from Airbus Protect has been reviewed jointly with Schneider Electric. Please see the Security Notification here.  In this article we will describe the process on how to perform a “Stuxnet type” attack on a Schneider Modicon M340 PLC. The end result was that we were able to design an automation program using C […]

Blog cyber security & cve - airbus protect

Why not catching exception hurts security products? A case study with Cybereason EDR (CVE-2020-26562 & CVE-2020-26871)

This vulnerability report is intended to study two vulnerabilities in Cybereason EDR (Endpoint Detection & Response) that allow a non-privileged user to cause a Denial of Service on two sensitive executables: minionhost.exe: This service runs with Authority NT/System rights and is responsible for collecting and delivering logs from and to other Cybereason executables. ExecutionPreventionSvc.exe: This service also runs with Authority […]

Blog Vulnerability report - Airbus Protect

Abusing a shared memory for getting a local privilege escalation on the Schneider Electric Modbus Serial Driver (CVE-2020-7523)

This vulnerability report is intended to demonstrate how the EcoStruxure Control Expert is prone to an arbitrary file write which results in a Local Privilege Escalation (LPE). An attacker could exploit this vulnerability to take full control of an affected system. This issue comes from a Schneider service, named ModbusDrvSys.exe, which runs with Authority NT/System rights and does not have […]