INTRINSEC INTRINSEC INTRINSEC INTRINSEC
  • Services & Products

      Services 

      IT Security Tips

      • Maturity Diagnosis
      • CISO as a Service
      • Risk Analysis
      • Business Resilience
      • Information Systems Security Governance
      • Audit & Compliance
      • Awareness

      Offensive Security & Auditing

      • Pentest
      • Red Team
      • Purple Team
      • TIBER-EU / DORA TLPT
      • Technical Audit

      Security architecture and integration 

      • Security architecture and integration

      Cyber Threat Intelligence

      • CTI - Cyber Threat Intelligence
      • TIS - Threat Intelligence Services
      • DRPS - Digital Risk Protection Services
      • EASM – External Attack Surface Management
      • Data leak detection
      • Brand protection

      Security Operations Center

      • MDR For Cloud
      • MDR For Endpoint
      • SOC - Security Operations Center
      • VOC - Vulnerability Operations Center

      Incident Response & Crisis Management

      • CERT Subscription
      • Cyber Crisis Management
      • Incident Response
      • Threat Hunting
      • Incident Response Academy

      Products 

      • Cyboard
      • Phish Tracker
      • Vuln Tracker
      • Extended Threat Intelligence Platform
      • CTI Feeds
  • Expertise

      Professions

      • Strategy & Governance
      • Risk identification & compliance
      • Security Architecture & Expertise
      • Cyber Defense Operations
      • Resilience & Business Continuity
      • Incident & Crisis Management
      • Cybersecurity Awareness & Culture

      challenges

      • Regulatory Compliance & Alignment
      • Business Resilience & Cyber Crisis Management
      • Trusted Clients & Cybersecurity Credibility
      • Efficiency & Performance Safety

      challenges

      • Cloud Security
      • Zero Trust & Access Security
      • NIS2 Directive
      • DORA Compliance
      • Data management
      • IoT Security
      • Patch Management
      • Cybersecurity Awareness

      Risks

      • System Availability & Integrity
      • Compliance & Governance
      • Data & Identities
      • Financials & Digital Fraud
      • Infrastructure & Suppliers
      • Advanced & Emerging Threats
  • Sector & Maturity

      Business sectors 

      Industrial
      Health
      Banking & Finance
      Audience
      Tech
      Retail

      Maturity levels

      Startups & Scaleups
      SMEs & Mid-Sized Companies
      Public entity
      Groups & Multinationals
      OIV & Ministries
  • The company

      Who are we ?

      Discover our history and expertise in cybersecurity.

      Our commitments

      We defend the integrity and security of your information systems.

      Recruitment

      Looking to take on exciting challenges? Join our teams.

      Partners

      Strategic alliances with leading players for optimal protection.

  • News

      Events

      Join us for our upcoming cybersecurity events, conferences and webinars.

      Blog

      Discover our analyses on cyber news, trends and our expert advice.

Contact
Contact

Expert perspectives

CERT

La réponse à incident par Luc, responsable du CERT-Intrinsec

IntrinsicJanuary 29, 2018
Uncategorized

Faille dans l’application Whatsapp

IntrinsicJanuary 29, 2018
Uncategorized

Portefeuilles de cryptomonnaies piratés : Electrum, BlackWallet

IntrinsicJanuary 29, 2018
CERT

CoRIIN 2018

IntrinsicJanuary 24, 2018
Uncategorized

CVE-2017-7344 Fortinet FortiClient Windows privilege escalation at logon

IntrinsicDecember 22, 2017
CERT

Botconf 2017 – troisième journée

IntrinsicDecember 13, 2017
CERT, SOC Operational Security

Botconf 2017 – deuxième journée

IntrinsicDecember 12, 2017
CERT, SOC Operational Security

Botconf 2017 – première journée

IntrinsicDecember 11, 2017
CERT

Hack.lu 2017

IntrinsicNovember 3, 2017
Security Watch

Hack.lu 2017

IntrinsicOctober 20, 2017
CERT, SOC Operational Security

Malware : infections via le Dynamic Data Exchange (DDE) de Microsoft Office

IntrinsicOctober 20, 2017
Security Watch

BruCON 0x09

Paul MARSOctober 16, 2017
  • 1
  • …
  • 8
  • 9
  • 10
  • 11
  • 12
  • …
  • 23
Logo_Isec_Slogan_white

Our job? To protect yours.

  • Who are we ?
  • Recruitment
  • Cookie Policy
  • Personal Data Protection Charter
  • Legal notice
  • Offensive Security & Auditing
  • SSI Council
  • Security Architecture & Integration
  • SOC - Security Operation Center
  • CTI – Cyber Threat Intelligence
  • CERT - Incident Response
  • © Intrinsec 2025 | All rights reserved
INTRINSEC
  • Services & Products

      Services 

      IT Security Tips

      • Maturity Diagnosis
      • CISO as a Service
      • Risk Analysis
      • Business Resilience
      • Information Systems Security Governance
      • Audit & Compliance
      • Awareness

      Offensive Security & Auditing

      • Pentest
      • Red Team
      • Purple Team
      • TIBER-EU / DORA TLPT
      • Technical Audit

      Security architecture and integration 

      • Security architecture and integration

      Cyber Threat Intelligence

      • CTI - Cyber Threat Intelligence
      • TIS - Threat Intelligence Services
      • DRPS - Digital Risk Protection Services
      • EASM – External Attack Surface Management
      • Data leak detection
      • Brand protection

      Security Operations Center

      • MDR For Cloud
      • MDR For Endpoint
      • SOC - Security Operations Center
      • VOC - Vulnerability Operations Center

      Incident Response & Crisis Management

      • CERT Subscription
      • Cyber Crisis Management
      • Incident Response
      • Threat Hunting
      • Incident Response Academy

      Products 

      • Cyboard
      • Phish Tracker
      • Vuln Tracker
      • Extended Threat Intelligence Platform
      • CTI Feeds
  • Expertise

      Professions

      • Strategy & Governance
      • Risk identification & compliance
      • Security Architecture & Expertise
      • Cyber Defense Operations
      • Resilience & Business Continuity
      • Incident & Crisis Management
      • Cybersecurity Awareness & Culture

      challenges

      • Regulatory Compliance & Alignment
      • Business Resilience & Cyber Crisis Management
      • Trusted Clients & Cybersecurity Credibility
      • Efficiency & Performance Safety

      challenges

      • Cloud Security
      • Zero Trust & Access Security
      • NIS2 Directive
      • DORA Compliance
      • Data management
      • IoT Security
      • Patch Management
      • Cybersecurity Awareness

      Risks

      • System Availability & Integrity
      • Compliance & Governance
      • Data & Identities
      • Financials & Digital Fraud
      • Infrastructure & Suppliers
      • Advanced & Emerging Threats
  • Sector & Maturity

      Business sectors 

      Industrial
      Health
      Banking & Finance
      Audience
      Tech
      Retail

      Maturity levels

      Startups & Scaleups
      SMEs & Mid-Sized Companies
      Public entity
      Groups & Multinationals
      OIV & Ministries
  • The company

      Who are we ?

      Discover our history and expertise in cybersecurity.

      Our commitments

      We defend the integrity and security of your information systems.

      Recruitment

      Looking to take on exciting challenges? Join our teams.

      Partners

      Strategic alliances with leading players for optimal protection.

  • News

      Events

      Join us for our upcoming cybersecurity events, conferences and webinars.

      Blog

      Discover our analyses on cyber news, trends and our expert advice.

Contact
INTRINSEC
About cookies

With your consent, Intrinsec uses cookies or similar technologies and processes personal data based on legitimate interests, to optimize the advertising campaigns we conduct on third-party sites (such as LinkedIn), but also to track our audiences (Umami).

By clicking on "I choose" you will access the detailed list of these cookies.

 

You can modify and customize the settings for the purposes of processing cookies and trackers for which you have given your consent. You can also object to all of these processing activities. Your choice will be saved for a period of 6 months.

Analytical storage Always active
Allow Google Analytics to measure how I use the site to improve functionality and service.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Advertising storage
The technical storage or access that is used exclusively for statistical purposes. Allow Google to save advertising information on my device for better ad relevance.
User advertising data
Sharing my activity data with Google for targeted advertising.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Choose my preferences
  • {title}
  • {title}
  • {title}
English
French