Evading endpoint security requires several steps and leverages numerous tools that allow to carry out ample sophisticated attacks, on larger scales, and considerably faster. The results depend certainly on the skills of the invader, but also on the scope and the time allocated to each analysis step. The cyber kill…

The term malware is the contraction of “malicious software”. It designates any program or software specifically designed or modified to damage a computer. It can thus be a keylogger, a trojan horse, a rogue, a ransomware, a computer worm… etc.

Since the appearance of the first computer worms, malware has…

Secteurs pharmaceutique et agroalimentaire en France

Recueillir des renseignements sur le dark web consiste à obtenir des informations sur ce qui se passe dans ces régions obscures. Conçus à l’origine pour être utilisés par les gouvernements, ces réseaux occultes ont constitué le principal défi en matière de renseignement sur les menaces.

L’intelligence automatique des données offre…

The General Data Protection Regulation (GDPR) came into force on 25th May 2018 to reinforce data protection while also providing enhanced uniformity to current data regulations. The GDPR concerns any person and any organization (company, association, administration, local authority, …) based in the EU but also non-EU members who manage…

In May 2017, the WannaCry attack has touched nearly 300,000 computers across 150 countries and has been ranked the most widespread malware over the last two years, affecting several companies and manufacturers. The Shadow Brokers hacker group (TSB) has published recently the EternalBlue exploit used by this extortion and leveraging…

Cybersecurity is not just one operation that would be always threatened. Cybersecurity is a continuous process, which must be integrated into everyday activities. It begins with an understanding of the risks and threats; You must understand your opponents, their goals, and how they lead their attacks.

Imagine a business victim…

P.O.TECH

P.O.TECH is a group of 6 entities: Potech Consulting, Potech Academy, Potech Labs, Obsoft, Potech SOC and NIGMA Conseil.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store