<br><br>cyberforce



cyberforce

CyberForce is a subdivision of i-Force,
a forensic audit firm based in Belgium.
Cyberforce focuses on digital security.
Cyberforce specialises in everything “cybersecurity-related” ,
from handling incidents and data-breaches
to rolling out preventive measures to keep attackers at bay.
The Cyberforce Team consists of highly trained individuals with a passion for digital security.
Forensic Readiness
Companies do not expect to be faced with internal fraud, hacking or data breaches. An optimized and "forensic-ready" IT infrastructure can provide the much-needed evidence for internal investigations to find out what happened and how it...
Incident Response
If you are the victim of a hacking attack or you suspect a data breach you need help and you need it fast. The i-Force incident response team can help you answer these questions. -...
Digital Security Scan
Digital Security Scan The ultimate diagnostic tool for measuring the resiliency of your IT security. Companies are vulnerable to IT-risks and this can have all kinds of serious consequences for all parties concerned. The perpetual...

Forensic Readiness

Companies do not expect to be faced with internal fraud, hacking or data breaches.

An optimized and “forensic-ready” IT infrastructure can provide the much-needed evidence for internal investigations to find out what happened and how it happened. Evidence is of course also critical when the fraud needs to be proven in a courtroom.

The last thing you want is that the person who committed fraud is able to walk away because of a lack of evidence.

You do not need to invest in expensive hardware to make your company “forensic-ready”,  it’s rather a long list of “configuration tweaks” that our consultant will perform in close cooperation with your IT department.

Is your IT Infrastructure forensic-ready?  Give us your details and we’ll find out together.

SANS FOR610 Prague : Course Review
When I saw Lenny Zeltser was teaching the SANS FOR610 course "Reverse-Engineering Malware" in Prague this year I dashed to my boss's office to beg...
Read More "SANS FOR610 Prague : Course Review"
Markov models : detecting malware through language recognition
Hi there , in this blog I'm going to give an introduction to the use of probability models for (written) language recognition to detect malware...
Read More "Markov models : detecting malware through language recognition"
Passwords 101 part 1: Cracking Password Hashes
This is the first blogpost in a series about passwords where I'll be using the LinkedIn leaked password database to analyze user password behaviour. This...
Read More "Passwords 101 part 1: Cracking Password Hashes"
Hunting for Ransomware with Powershell
  This is part 2 of the series on remote IOC scanning with Powershell. We left off with our script being able to scan remotely...
Read More "Hunting for Ransomware with Powershell"
Malvertising: how ads can become more than just annoying
Malvertising, a portmanteau of malicious advertising, is an interesting technique to spread malware which leverages the omnipresence of online ads in today's internet landscape. It's...
Read More "Malvertising: how ads can become more than just annoying"
SANS FOR610 Prague : Course Review
When I saw Lenny Zeltser was teaching the SANS FOR610 course "Reverse-Engineering Malware" in Prague this year I dashed to my boss's office to beg...
Read More "SANS FOR610 Prague : Course Review"
Markov models : detecting malware through language recognition
Hi there , in this blog I'm going to give an introduction to the use of probability models for (written) language recognition to detect malware...
Read More "Markov models : detecting malware through language recognition"
Passwords 101 part 1: Cracking Password Hashes
This is the first blogpost in a series about passwords where I'll be using the LinkedIn leaked password database to analyze user password behaviour. This...
Read More "Passwords 101 part 1: Cracking Password Hashes"
Hunting for Ransomware with Powershell
  This is part 2 of the series on remote IOC scanning with Powershell. We left off with our script being able to scan remotely...
Read More "Hunting for Ransomware with Powershell"
Malvertising: how ads can become more than just annoying
Malvertising, a portmanteau of malicious advertising, is an interesting technique to spread malware which leverages the omnipresence of online ads in today's internet landscape. It's...
Read More "Malvertising: how ads can become more than just annoying"
Petya Ransomware: a new approach to messing up your files
A new kind of ransomware has been noticed recently. It's called Petya (according to Wikipedia this is a Bulgarian female given name or a Russian...
Read More "Petya Ransomware: a new approach to messing up your files"
Remote IOC scanning with powershell
The next couple of weeks I’m going to post some short articles about Windows based (Powershell – batch - wmi ) scripting that will show...
Read More "Remote IOC scanning with powershell"

Markov models : detecting malware through language recognition

Hi there , in this blog I’m going to give an introduction to the use of probability models for (written) language recognition to detect malware and demonstrate it with a .net / powershell implementation of a Markov model . It’s not uncommon encounter text  that was generated randomly by malware. …

Hunting for Ransomware with Powershell

  This is part 2 of the series on remote IOC scanning with Powershell. We left off with our script being able to scan remotely for the existence of files and registry keys. The limitation we had so far was that when we specified registry keys in the HKEY_CURRENT_USER hive …

Malvertising: how ads can become more than just annoying

Malvertising, a portmanteau of malicious advertising, is an interesting technique to spread malware which leverages the omnipresence of online ads in today’s internet landscape. It’s basically malicious adverts which will try to infect unsuspecting users when the ads are loaded or clicked upon. Fox-IT reported about a large scale malvertising campaign …

Petya Ransomware: a new approach to messing up your files

A new kind of ransomware has been noticed recently. It’s called Petya (according to Wikipedia this is a Bulgarian female given name or a Russian diminutive for the male given name Piotr). The Petya ransomware takes a whole new approach to messing up your computer. Unfortunately this new crypto takes …

7 Hot Tips To Destroy Your Business Quickly and Efficiently aka How To Get Hacked

Want to have some laughs at work ? As in : “Hahaha, remember when we got breached Bob ? You should’ve seen the look on our boss’ face!”  Want to learn how to get “Pwned” quickly ? You’ve come to the right address, because Cyberforce.be is offering you some piping …