Blog:

On 2024-03-14
by Julien Houry, Incident Responder
Cybersecurity

Uncovering Cyber Intruders: A Forensic Deep Dive into NetScan, Angry IP Scanner, and Advanced Port Scanner

Uncovering Cyber Intruders

The use of network scanners with a graphical user interface has been observed in a number of former IR engagements conducted by our CSIRT.
Discover how operators use these tools to map networks and minimize detection.

  • Share

Testimonials & Interviews

Discover more
3 questions, 2 experts : SOC Edition Cybersecurity

3 questions, 2 experts: SOC analyst edition

To outsiders, the security operations centre (SOC) can seem like an impenetrable black box. To lift the lid on what really goes on inside Airbus Protect’s SOC, we interviewed Pauline and Valentin, two of our analysts.

Read more
Women in STEM template Sustainability

Women In STEM: Ibriza, Industrial Risk Design Engineer

Ibriza Jouini  joined Airbus Protect in Toulouse back in November, 2022. In this interview, she explains what the job of an Industrial Risk Engineer entails and offers valuable advice to women  aspiring to work in engineering.

Read more

Discover all the latest releases

Airbus Protect - Locked Shields exercice Cybersecurity

Airbus Protect at the world’s largest live-fire cyber defence exercise “Locked Shields”

A premiere for Airbus. This year, at the invitation of the Bundeswehr Cyber Security Centre, a team from Airbus Protect took part in the NATO exercise “Locked Shields” for the first time.  What is Locked Shields? The exercise has been conducted annually since 2010 by the “NATO Cooperative Cyber Defence Center of Excellence” (CCDCOE) and […]

Read more
Women in stem - pip Cybersecurity

Women in STEM: Phillipa Phipps, Cybersecurity Consultant

Phillipa Phipps is a Cybersecurity Consultant at Airbus Protect. She didn’t take the traditional route into a cybersecurity career. But that just makes her journey more interesting! Find out more in this interview.

Read more
experts working in a SOC Cybersecurity

How to provide Cyber Threat Intelligence in the frame of a modern SOC?

Find out how to use CTI as an Operational Support (part 1) Introduction to Cyber Threat Intelligence Cyber Threat Intelligence is a discipline of Intelligence applied to the cyber field. According to Kent’s Analytic Doctrine[1], the role of (Cyber) Intelligence Analysts is to provide “information and insights to policy decision-makers and action-takers”. In the context […]

Read more