NorthSec 2020 Exam Solutions Challenge Writeup
The following post describes the way I solved the challenge Exam Solutions from the NorthSec 2020 CTF. A zip file containing two files was provided: SeverityHighProtector.zip [...]
The following post describes the way I solved the challenge Exam Solutions from the NorthSec 2020 CTF. A zip file containing two files was provided: SeverityHighProtector.zip [...]
In the last Northsec event, I had the chance to play with a fun audio challenge. I had never done an audio steganography challenge before, so maybe the way I did it may seem obvious for some, but [...]
Although most employees use network or cloud folders to back up business documents, some employees may back up files locally on their devices (computer, tablet, etc.), sometimes for convenience [...]
The world of computer security is always evolving, from anti-virus and firewall, all the way to DDoS protection and monitoring networks using AI, the industry relies on a plethora of solutions [...]
The Desjardins incident has been in the spotlight in recent weeks and has highlighted the importance of personal data protection. Several questions have been raised and the establishment of a [...]
Okiok is releasing version 4.10.2 of S-Filer/Portal™. This release is mainly a bug fixes release and does not introduce new feature in the product. Features There are no new features [...]
Last week was the annual ASIMM Symposium, where several cybersecurity experts discussed fascinating and disturbing news topics. Among them, the challenges of cyberterrorism in 2018, presented by [...]
OKIOK’s President, Mr. Claude Vigeant and Mr. René Vergé from Bombardier will present the conference “La transformation des TI dans les entreprises à l’époque de [...]
Introduction In this blog post, I am going to explain how we used GitLab and OpenShift to automatically deploy S-Filer when a new change is made in our repository. This is a very useful tool to [...]
In version 4.9.0 of S-Filer Portal, we have decided to address an important pain point with the solution: TLS configuration. We are a security company and we promote the use of TLS, but [...]