Blog:

On 2025-07-15
by Emma Mullins, Cyber Defence Specialist - Intelligence
Cybersecurity

Cyber Threat Intelligence Part 3: Artificial Intelligence for Intelligence Collection

Cyber Threat Intelligence part 3: AI for intelligence collection
Reminder: Cyber Threat Intelligence Cyber threats are continuously growing in complexity and frequency, therefore the ability to rapidly process and act upon Cyber Threat Intelligence (CTI) can mean the difference between a mitigated threat and a breach. In the first part of our CTI focused blog posts series, we introduced the Intelligence Production Cycle and [...]
  • Share

Testimonials & Interviews

Discover more
Road to 2025 with Airbus Protect's CEO Thierry Racaud Interview

Road to 2025: Thierry Racaud’s Vision for the Year

As the new year begins, we wanted to ask our CEO how he reflects on 2024 and what his vision for 2025 is. What are your main takeaways from 2024 and how do they influence your 2025 strategy? Last year demonstrated the relevance of our long-term strategy and business positioning: the combination of safety, cybersecurity [...]

Read more
World autism Awareness Day Interview

World Autism Awareness Day

Meet Elisabeth, Inclusion & Diversity representative and Prune, who explain our program to hire neurodivergent people at Airbus Protect.

Read more

Discover all the latest releases

CSIRT blogpost

Incident Response: Analysis of recent version of BRC4

Introduction During our latest incident response case we have discovered a recent sample of Brute Ratel C4 packed with Themida. BRC4 is a powerful Command and Control (C2) tool which allows to control targeted workstations through an executable agent. The objective of Themida is to protect code against reverse engineering. Currently, C2 tools are used [...]

Read more
understanding digital risk management Cybersecurity

Digital Risk Management: A Business-Aligned Approach

Organisations today face a complex and evolving array of risks that require effective management. Some are inherently digital, while others are traditional risks amplified by technology. From cyberattacks to technical disruptions, these threats pose significant challenges for businesses, holding the power to impact operations, finances, reputation, and ultimately bottom line.  To safeguard their future, organisations [...]

Read more
Airbus Protect explains Vulnerability Management Cybersecurity

Airbus Protect explains: Vulnerability Management

What is vulnerability management? Vulnerability analyst Pierre Louis Gensou explains. Vulnerability management and vulnerability intelligence are crucial elements of IT security. As a vulnerability analyst, my role is to identify security flaws, assess their impact on the components we monitor, and inform customers of the associated risks. What is a vulnerability? When we say "vulnerability", [...]

Read more
Regulation (EU, Euratom) 2023/2841: What does it mean for EUIBA? Cybersecurity

Regulation (EU, Euratom) 2023/2841: What does it mean for EUIBAs?

What is Regulation 2023/2841?   The EU cybersecurity Regulation, which came into force at the start of this year, aims to establish a comprehensive and standardised approach to cybersecurity across European Union Institutions, Bodies and Agencies (EUIBA). This ensures that all entities are well-protected against evolving cyber threats and capable of executing a coordinated incident […]

Read more
Understanding the EU AI Act in 5 steps Cybersecurity

The EU AI Act has come into force! Here’s what you need to know.

After long negotiations and discussions between European institutions and bodies, the EU AI Act came into force on August 1, 2024. While Artificial Intelligence offers vast potential and commercial opportunities, the ethical implications and inherent risks of AI mean it must be used responsibly and in moderation. The EU AI Act establishes clear guidelines to […]

Read more
Cybersecurity in industrial and manufacturing environments: Understanding the fundamentals Cybersecurity

Cybersecurity in industrial and manufacturing environments: understanding the fundamentals

Introduction to OT Security Source: CEA list from DIMS event, 16th May 2024   You've probably heard of Industry 4.0 – the ongoing automation of manufacturing and industrial practices using modern technology. More industries are embracing this approach by incorporating IoT, cloud, AI and cyber-physical systems into their production chain. The resulting connectivity boosts productivity [...]

Read more