News and insights

Slider
PowerShell and live response – why are they so good together?

PowerShell and live response – why are they so good together?

PowerShell is a powerful management tool designed for system automation and configuration; however, its suppleness makes it justifiable to use for other purposes as well. Recent development of PowerShell has placed it also on the list of the live response tools an incident responder should have in their toolbox. In this blog post I’ll go through several key points why PowerShell is as good as it is from the incident responders’ point of view.
Read More
Healthcare under attack – Cyber security incident response in times of pandemic

Healthcare under attack – Cyber security incident response in times of pandemic

These days we can constantly read about new cyberattacks against private and public actors. Even before COVID-19, the healthcare sector...
Read More
Cyber Kill Chain Based Approach for Intrusion Detection

Cyber Kill Chain Based Approach for Intrusion Detection

The number of intrusions into organization IT environments has been increasing over the years. Detecting intrusions remains a difficult task...
Read More
CISS2020-OL: Attacking the Secure Water Treatment testbed

CISS2020-OL: Attacking the Secure Water Treatment testbed

JYVSECTEC Red Team participated in CISS2020-OL Critical Infrastructure Security Showdown 2020 Online competition and placed 3rd out of 17 teams....
Read More
Adding Realism to Cyber Security Exercises – Populating RGCE environment

Adding Realism to Cyber Security Exercises – Populating RGCE environment

Our Realistic Global Cyber Environment (RGCE) is a feature rich live cyber range that brings together a realistic global world and...
Read More
Continuous integration in collaborative analysis of incidents = CINCAN

Continuous integration in collaborative analysis of incidents = CINCAN

Some say all good things must come to an end. The CINCAN project started in 2018 and this 2-year project,...
Read More
Carry out investigations remotely using containerized GRR

Carry out investigations remotely using containerized GRR

The containerized GRR is a forked version of GRR Rapid Response, incident response framework designed by Google engineers. In today’s...
Read More
Deploy the containerized GRR to unmask the intruders

Deploy the containerized GRR to unmask the intruders

Containerized GRR is a forked implementation of the GRR Rapid Response, a tool for incident response designed and developed by...
Read More
Police and organisations join forces in the control of cybercrime

Police and organisations join forces in the control of cybercrime

There are great sighs of relief among cyber criminals because the systems in use in organisations are not up to...
Read More
Experiences with Hardened Firefox

Experiences with Hardened Firefox

After studying Internet user tracking and how to avoid it in my Thesis, I decided to experiment with Firefox privacy...
Read More
Why are we sensitive to cyber attack

Why are we sensitive to cyber attack

In the digital world, whenever we click on something and reply to some request for information, we are at every...
Read More
Tool for extracting possible IoC information from files

Tool for extracting possible IoC information from files

This blog post presents a tool called ioc_strings that can be used to gather relevant technical information from file strings....
Read More
National Cyber Security Exercise 2019 is over or is it?

National Cyber Security Exercise 2019 is over or is it?

Week 21 was the actual exercise week for the national cyber security exercise. The immense planning and implementation work led...
Read More
Optimising and securing Dockerfiles

Optimising and securing Dockerfiles

In an earlier post, Analysing malicious PDF documents using Dockerized tools, we covered the use of some PDF analysis tools we...
Read More
Disobey – The Nordic Security Event

Disobey – The Nordic Security Event

Disobey, the annual Nordic security event was held on 11th-12th of January 2019 at Kaapelitehdas, Helsinki. The group of JYVSECTEC...
Read More
Analysing malicious PDF documents using Dockerized tools

Analysing malicious PDF documents using Dockerized tools

One of the goals of the CinCan project is to provide tools that automate the repetitive tasks of malware analysis...
Read More
From trainee to employee

From trainee to employee

Practical training is an important part of studies and has a special part in education. Training period gives an excellent...
Read More
User Tracking in Internet

User Tracking in Internet

User tracking has gained interest after it has become a major source of revenue for advertisers. Tracking methods have evolved...
Read More
RGCE organizational environments

RGCE organizational environments

JYVSECTEC’s cyber range RGCE has been in development since 2011 aiming to provide a realistic exercise environment for organizations of different sizes...
Read More
Experiences of the ECSO WG4 (SME group) meeting

Experiences of the ECSO WG4 (SME group) meeting

I am representing JAMK University of Applied Sciences in the ECSO Working Group 4 (WG4), which deals with SME issues....
Read More
JYVSECTEC success story

JYVSECTEC success story

Construction phase 2010 – 2014 First negotiations about co-operation in research and development program around network and computer security were...
Read More
Cyber exercising to enhance performance

Cyber exercising to enhance performance

First of all, I will have to confess right at the beginning that my over 30-year career at the Finnish...
Read More
Christmas greetings

Christmas greetings

We want to thank our cooperation partners and people we have met. This year has gone quickly and it has...
Read More
Cyber Challenge 2015

Cyber Challenge 2015

Cyber Challenge 2015 was held in connection with Cyber Security & ICT 2015 Exhibition in the congress centre Jyväskylän Paviljonki...
Read More
Cyber security & ICT 2015 exhibition: Ready, Steady, Go!

Cyber security & ICT 2015 exhibition: Ready, Steady, Go!

The ongoing month is already halfway and soon comes the day when the doors open onto the Cyber Security &...
Read More

In JYVSECTEC's blog, we present the knowledge, ideas and experiences of cyber security in the activities of Jyväskylä University of Applied Sciences. The texts provide current insights on cyber security and build a reliable image of strong Finnish cyber security expertise.

The editorial board of JYVSECTEC: Tuula Kotikoski, Elina Suni, and Heli Sutinen.

Slider