INTRINSEC INTRINSEC INTRINSEC INTRINSEC
  • Services & Products

      Services 

      IT Security Tips

      • Maturity Diagnosis
      • CISO as a Service
      • Risk Analysis
      • Business Resilience
      • Information Systems Security Governance
      • Audit & Compliance
      • Awareness

      Offensive Security & Auditing

      • Pentest
      • Red Team
      • Purple Team
      • TIBER-EU / DORA TLPT
      • Technical Audit

      Security architecture and integration 

      • Security architecture and integration

      Cyber Threat Intelligence

      • CTI - Cyber Threat Intelligence
      • TIS - Threat Intelligence Services
      • DRPS - Digital Risk Protection Services
      • EASM – External Attack Surface Management
      • Data leak detection
      • Brand protection

      Security Operations Center

      • MDR For Cloud
      • MDR For Endpoint
      • SOC - Security Operations Center
      • VOC - Vulnerability Operations Center

      Incident Response & Crisis Management

      • CERT Subscription
      • Cyber Crisis Management
      • Incident Response
      • Threat Hunting
      • Incident Response Academy

      Products 

      • Cyboard
      • Phish Tracker
      • Vuln Tracker
      • Extended Threat Intelligence Platform
      • CTI Feeds
  • Expertise

      Professions

      • Strategy & Governance
      • Risk identification & compliance
      • Security Architecture & Expertise
      • Cyber Defense Operations
      • Resilience & Business Continuity
      • Incident & Crisis Management
      • Cybersecurity Awareness & Culture

      challenges

      • Regulatory Compliance & Alignment
      • Business Resilience & Cyber Crisis Management
      • Trusted Clients & Cybersecurity Credibility
      • Efficiency & Performance Safety

      challenges

      • Cloud Security
      • Zero Trust & Access Security
      • NIS2 Directive
      • DORA Compliance
      • Data management
      • IoT Security
      • Patch Management
      • Cybersecurity Awareness

      Risks

      • System Availability & Integrity
      • Compliance & Governance
      • Data & Identities
      • Financials & Digital Fraud
      • Infrastructure & Suppliers
      • Advanced & Emerging Threats
  • Sector & Maturity

      Business sectors 

      Industrial
      Health
      Banking & Finance
      Audience
      Tech
      Retail

      Maturity levels

      Startups & Scaleups
      SMEs & Mid-Sized Companies
      Public entity
      Groups & Multinationals
      OIV & Ministries
  • The company

      Who are we ?

      Discover our history and expertise in cybersecurity.

      Our commitments

      We defend the integrity and security of your information systems.

      Recruitment

      Looking to take on exciting challenges? Join our teams.

      Partners

      Strategic alliances with leading players for optimal protection.

  • News

      Events

      Join us for our upcoming cybersecurity events, conferences and webinars.

      Blog

      Discover our analyses on cyber news, trends and our expert advice.

Contact
Contact

Expert perspectives

Cyber Threat Intelligence, Threat Intelligence Report

Campaigns targeting the aerospace industry in Russia

David SardinhaNovember 27, 2025
Safety Assessment

MSI packages and local privilege escalation in 2025

IntrinsicNovember 26, 2025
Research and Development, Red Teaming, Penetration test

Hide the threat – GPO lateral movement

Paul Saladin (P-alu)November 25, 2025
Safety Assessment

BitLocker bypass: a simpler alternative to TPM sniffing

Cassius GARATNovember 19, 2025
SOC Operational Security

SOC: Understanding the key role of the Security Operations Center

IntrinsicNovember 4, 2025
Safety Assessment

Pentest: Complete Guide to Intrusion Testing in 2025

IntrinsicOctober 31, 2025
Cyber Threat Intelligence, Uncategorized, Threat Intelligence Report

Global Group: ransomware rebranding stories 

Ruben MadarOctober 30, 2025
Safety Assessment

Pentest black box vs grey box: which one to choose?

IntrinsicOctober 28, 2025
Cyber Threat Intelligence

Understanding Cyber Threat Intelligence (CTI)

IntrinsicOctober 6, 2025
Cyber Threat Intelligence, Threat Intelligence Report

Analysis of Acreed, a rising infostealer

IntrinsicSeptember 26, 2025
Cyber Threat Intelligence, Threat Intelligence Report

VAIZ, FDN3, TK-NET: Ukrainian Networks Driving Brute Force Attacks

David SardinhaAugust 29, 2025
Cyber Threat Intelligence, Threat Intelligence Report

Shadow syndicate infrastructure illumination

IntrinsicJuly 30, 2025
  • 1
  • 2
  • 3
  • …
  • 23
Logo_Isec_Slogan_white

Our job? To protect yours.

  • Who are we ?
  • Recruitment
  • Cookie Policy
  • Personal Data Protection Charter
  • Legal notice
  • Offensive Security & Auditing
  • SSI Council
  • Security Architecture & Integration
  • SOC - Security Operation Center
  • CTI – Cyber Threat Intelligence
  • CERT - Incident Response
  • © Intrinsec 2025 | All rights reserved
INTRINSEC
  • Services & Products

      Services 

      IT Security Tips

      • Maturity Diagnosis
      • CISO as a Service
      • Risk Analysis
      • Business Resilience
      • Information Systems Security Governance
      • Audit & Compliance
      • Awareness

      Offensive Security & Auditing

      • Pentest
      • Red Team
      • Purple Team
      • TIBER-EU / DORA TLPT
      • Technical Audit

      Security architecture and integration 

      • Security architecture and integration

      Cyber Threat Intelligence

      • CTI - Cyber Threat Intelligence
      • TIS - Threat Intelligence Services
      • DRPS - Digital Risk Protection Services
      • EASM – External Attack Surface Management
      • Data leak detection
      • Brand protection

      Security Operations Center

      • MDR For Cloud
      • MDR For Endpoint
      • SOC - Security Operations Center
      • VOC - Vulnerability Operations Center

      Incident Response & Crisis Management

      • CERT Subscription
      • Cyber Crisis Management
      • Incident Response
      • Threat Hunting
      • Incident Response Academy

      Products 

      • Cyboard
      • Phish Tracker
      • Vuln Tracker
      • Extended Threat Intelligence Platform
      • CTI Feeds
  • Expertise

      Professions

      • Strategy & Governance
      • Risk identification & compliance
      • Security Architecture & Expertise
      • Cyber Defense Operations
      • Resilience & Business Continuity
      • Incident & Crisis Management
      • Cybersecurity Awareness & Culture

      challenges

      • Regulatory Compliance & Alignment
      • Business Resilience & Cyber Crisis Management
      • Trusted Clients & Cybersecurity Credibility
      • Efficiency & Performance Safety

      challenges

      • Cloud Security
      • Zero Trust & Access Security
      • NIS2 Directive
      • DORA Compliance
      • Data management
      • IoT Security
      • Patch Management
      • Cybersecurity Awareness

      Risks

      • System Availability & Integrity
      • Compliance & Governance
      • Data & Identities
      • Financials & Digital Fraud
      • Infrastructure & Suppliers
      • Advanced & Emerging Threats
  • Sector & Maturity

      Business sectors 

      Industrial
      Health
      Banking & Finance
      Audience
      Tech
      Retail

      Maturity levels

      Startups & Scaleups
      SMEs & Mid-Sized Companies
      Public entity
      Groups & Multinationals
      OIV & Ministries
  • The company

      Who are we ?

      Discover our history and expertise in cybersecurity.

      Our commitments

      We defend the integrity and security of your information systems.

      Recruitment

      Looking to take on exciting challenges? Join our teams.

      Partners

      Strategic alliances with leading players for optimal protection.

  • News

      Events

      Join us for our upcoming cybersecurity events, conferences and webinars.

      Blog

      Discover our analyses on cyber news, trends and our expert advice.

Contact
INTRINSEC
About cookies

With your consent, Intrinsec uses cookies or similar technologies and processes personal data based on legitimate interests, to optimize the advertising campaigns we conduct on third-party sites (such as LinkedIn), but also to track our audiences (Umami).

By clicking on "I choose" you will access the detailed list of these cookies.

 

You can modify and customize the settings for the purposes of processing cookies and trackers for which you have given your consent. You can also object to all of these processing activities. Your choice will be saved for a period of 6 months.

Analytical storage Always active
Allow Google Analytics to measure how I use the site to improve functionality and service.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Advertising storage
The technical storage or access that is used exclusively for statistical purposes. Allow Google to save advertising information on my device for better ad relevance.
User advertising data
Sharing my activity data with Google for targeted advertising.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Choose my preferences
  • {title}
  • {title}
  • {title}
English
French