Markov models : detecting malware through language recognition

Hi there , in this blog I’m going to give an introduction to the use of probability models for (written) language recognition to detect malware and demonstrate it with a .net / powershell implementation of a Markov model . It’s not uncommon encounter text  that was generated randomly by malware. …

Hunting for Ransomware with Powershell

  This is part 2 of the series on remote IOC scanning with Powershell. We left off with our script being able to scan remotely for the existence of files and registry keys. The limitation we had so far was that when we specified registry keys in the HKEY_CURRENT_USER hive …

7 Hot Tips To Destroy Your Business Quickly and Efficiently aka How To Get Hacked

Want to have some laughs at work ? As in : “Hahaha, remember when we got breached Bob ? You should’ve seen the look on our boss’ face!”  Want to learn how to get “Pwned” quickly ? You’ve come to the right address, because Cyberforce.be is offering you some piping …

Apparently hacking is now legal (if you’re British Intelligence)

The GCHQ HQ – Image: Flickr, UK Ministry of Defence In September 2014 the news broke that Belgacom, one of the largest Belgian telecom companies was infiltrated by GCHQ, Britain’s intelligence service and apparently these people were monitoring all traffic flowing through Belgacom’s (now called Proximus) servers. This news came …

IT Security Audits : Better Safe Than Sorry

A fascinating part of performing IT Security Audits at a customer is ‘the human factor’. You might have installed the most advanced firewall on earth to keep cyber criminals out and paid insane amounts of dollars, the reality is that when a phishing mail slips through your net and an …