Blog:

On 2024-03-14
by Julien Houry, Incident Responder
Cybersecurity

Uncovering Cyber Intruders: A Forensic Deep Dive into NetScan, Angry IP Scanner, and Advanced Port Scanner

Uncovering Cyber Intruders

The use of network scanners with a graphical user interface has been observed in a number of former IR engagements conducted by our CSIRT.
Discover how operators use these tools to map networks and minimize detection.

  • Share

Testimonials & Interviews

Discover more
3 questions, 2 experts : SOC Edition Cybersecurity

3 questions, 2 experts: SOC analyst edition

To outsiders, the security operations centre (SOC) can seem like an impenetrable black box. To lift the lid on what really goes on inside Airbus Protect’s SOC, we interviewed Pauline and Valentin, two of our analysts.

Read more
Women in STEM template Sustainability

Women In STEM: Ibriza, Industrial Risk Design Engineer

Ibriza Jouini  joined Airbus Protect in Toulouse back in November, 2022. In this interview, she explains what the job of an Industrial Risk Engineer entails and offers valuable advice to women  aspiring to work in engineering.

Read more

Discover all the latest releases

man search on Internet cybersecurity information Cybersecurity

Cybersecurity jargon busting: MDR, SOC, EDR, XDR, SOAR and SIEM

MDR, SOC, EDR, XDR, SOAR and SIEM, what does it all mean? In cyber-security, we’re notorious for using an abundance of two, three and even four-word acronyms. If you’re new to the space, these can be confusing, to say the least. To make things a little easier, we’ve created this guide! It explains some of […]

Read more
AD Canary part 3 Cybersecurity

Active Directory: A canary under your hat part 3

Foreword: This three-part blog article series focuses on some research work on how to detect effectively Active Directory enumeration in a SOC environment. To help you through this quite long journey, grab a cup of hot beverage of your liking, and use this short reference: Part 1: about detecting AD enumeration This first part explains [...]

Read more
How to ensure hydrogen safety? Hydrogen

Airbus Protect explains: How can we ensure hydrogen safety and security?

You’ve heard a lot of hype around hydrogen as an emerging energy source. But do you know how companies like Airbus Protect are working to mitigate safety and security risks in this sector? Pierre Sécher explains.  Europe’s hydrogen sector is developing fast. Largescale production will soon become a reality and new use cases are being […]

Read more
AD Canary Cybersecurity

Active Directory: A canary under your hat – Part 2

Foreword: This three-part blog article series focuses on some research work on how to detect effectively Active Directory enumeration in a SOC environment. To help you through this quite long journey, grab a cup of hot beverage of your liking, and use this short reference: Part 1: about detecting AD enumeration  This first part explains […]

Read more
Airbus Protect explains: Digital Risk Protection Cybersecurity

What is Digital Risk Protection? Airbus Protect explains

The pace of digital transformation continues to accelerate, with public and private sector organisations embracing cloud, automation and even artificial intelligence. But once you go ‘all digital’, how can you protect your assets? Gareth Davies, CTI and Vulnerability Lead at Airbus Protect, explains why digital risk protection should be on your organisation’s radar. When organisations […]

Read more
AD Canary Cybersecurity

Active Directory: A canary under your hat

Using AD DACL backdoors as a detection primitive for AD enumeration Foreword: This three-part blog article series focuses on some research work on how to detect effectively Active Directory enumeration in a SOC environment. To help you through this quite long journey, grab a cup of hot beverage of your liking, and use this short […]

Read more