Blog
April 5, 2024
From Zaragoza with Love: Insights from the DFRWS 2024 EU Conference
Introduction From the 19 to the 22 of March, 3 members of our CSIRT Team had the chance to attend the DFRWS EU Conference 2024 held in Zaragoza. The conference showcased cutting-edge research and insights into digital forensics and state-of-the art knowledge in the field. In this blog post, we’ll
Category :
Blog
March 19, 2024
Hacknowledge’s Journey to Splunk EMEA BOTS 2024
Two Hacknowledge teams travelled from Morges to Zurich to represent the company at Splunk EMEA BOTS 2024, learn new things, and last but not least, have fun and meet inspiring people! The first team was composed from Security Engineers and SOC Analysts from the ISSE department who were relatively new
Category :
Blog
March 13, 2024
EDR/AV Bypass [Part 1] : The Automated Payload Obfuscator “Pinguino”
Obfuscation is crucial for malware to evade detection by security tools, prolonging its undetected operation. Top obfuscation techniques include code encryption, polymorphism, metamorphism, dynamic API resolution, and anti-debugging mechanisms. Code obfuscation, such as variable renaming and insertion of meaningless code, adds complexity to hinder analysis. These techniques collectively aim to
Category :
Blog
November 20, 2023
[Part1] New Microsoft Sentinel’s Enrichment Widget in UEBA Module
Introduction Last week took place Microsoft ignite in Seattle. I was focused on new announcements regarding Sentinel and/or Defender. And the first one who shined in my eyes: the enrichment widget for the UEBA feature in Sentinel🤩. The promise of this new feature is to empowers security analysts to gain
Category :
Blog
August 29, 2023
Hacknowledge attend DEFCON 31 in Las Vegas
Las Vegas – a city known for its dazzling lights, vibrant entertainment, and now, an annual pilgrimage for cybersecurity enthusiasts from around the world. DEFCON, the world’s largest and one of the most renowned hacker conferences, recently unfolded and Hacknowledge had the opportunity to send two engineers to the event,
Category :
Blog
June 20, 2023
Purple Teaming
In the ever-evolving landscape of cybersecurity, organizations are continuously seeking ways to enhance their defenses against sophisticated threats. Traditional approaches like Red Teaming and Blue Teaming have played crucial roles in identifying vulnerabilities and responding to attacks. However, the Purple Teaming approach has emerged as a powerful methodology that bridges
Category :
Blog
May 4, 2023
Genev’Hack 2023 – registrations are open
REGISTRATION OPEN FOR GENEV’HACK 2023 When : 06/06/2023 , from 13h30 (doors opening at 13h) What : Security conferences + Boss of the SOC contest Entry cost : Attendance to the conference is free of charge for participants Where : Geneva, Palexpo (Airport + Train) Open to : All
Category :
Blog ,
News & Media
April 6, 2023
Document archiving: the safest way to store business documents
Secured data archiving is important at all levels.Here is an article from a sister company, Klara, explaining the importance of document archiving Security is an essential aspect of every company – and anyone believing that archiving documents in filing cabinets is the safest solution is sorely mistaken. Studies show
Category :
Blog
March 23, 2023
What a week for the Analytics Team @Hacknowledge! (and it was only Wednesday)
The team was invited to the Splunk Partner Tech Day in Splunk’s premises in Zurich where amazing tech talks were given by @Alex Piger and others: Multi-Instance Design best practices (Architecture Blueprint, Automation, Search Options) GDI Update: Ingest Actions, Data Manager, Edge Processor Splunk Operator 4 Kubernetes Differences Splunk Cloud <<>>
Category :
Blog ,
News & Media
March 20, 2023
Splunk Cloud: A (Hopefully) Comprehensive and Technical Review
Or What Splunk Cloud teaches us about managing an on-premises infrastructure? Disclaimer These are key points on the difference and benefits/drawbacks from its author’s perspective and this do not reflect the opinion of Hacknowledge nor the Analytics team of Hacknowledge. This article highlights points that are important considering its author
Category :
Blog