Botnets command and control mechanisms evolution

Botnets and command and control mechanisms Approximately 5% of PCs around the world might be infected right now by a malicious code, so at least, 50 million. This significant rate can be explained by many factors like the lack of […]

Watering Hole

The most common attackers’ motivations are financial gain, personal glory, malicious acts and espionage. Whatever the attack’s purpose, at least one system needs to be compromised. To reach their goal, attackers have a wide range of vectors including security bypass, […]

Bitcoin and regulation of digital money

The Bitcoin rush Bitcoin shares one major principle with gold: its value is just based on its scarcity. Its generation model is based on an open source code implemented in “Bitcoin Mining” software. These software are portable and can be […]

LEXSI founding member of ECSG: European Cyber Security Group

LEXSI proud to be one of the founding member of ECSG: European Cyber Security Group. This newly created Dutch not-for-profit foundation already includes : CSIS Fox-IT LEXSI S21SEC Our group is trying to reinforce our ability to defend private and public organizations […]