Skip to content
BLOG
Latest news of Chimere.

You can follow Chimere on LinkedIn .

Blog

You will find in this blog all the Chimere latest news, the events and important announcements!


3 types of attacks feared by companies

When exchanging with CISOs and CIOs about the actions to be taken to ensure optimal security of their information systems, user awareness and the implementation of good security hygiene practices are frequently discussed. It is undeniable that the human factor often plays a decisive role in the compromise of information systems. While raising awareness among employees and partners is essential, it is common to observe decision-makers adopting a fatalistic view of the situation and considering that security through the use of technical solutions is a failure.

Are they right? In an attempt to provide some insights in this article, we address three well-known techniques that attackers employ to hack enterprise computer systems, and against which security services must fight.

Continue reading

230724-3-types


Chimere joins the Wavestone 2023 radar of cybersecurity startups in France.

Chimere, along with 31 other new startups, joins the annual landscape of French cybersecurity startups.

Continue reading

230616-radar-wavestone


How to use the Tor darknet to protect your information system?

In the article about the issue of service exposure and 10 cyber-attacks that have exploited the principle of exposure, we highlighted the risks associated with exposing services on the internet.

But what if we could conceal these services, preventing them from being discovered by just anyone?

One way to achieve this is by using the Chimera network and its hidden services mechanism it offers. However, if you have only a few services and users to manage, performance is not a concern, and you enjoy getting your hands dirty, why not directly use the Tor network? This method is particularly interesting for individuals or small enterprise information systems.

Let's see how to protect an SSH service and avoid becoming a target for attacks. Let's dive in!

Continue reading

230608-darknet


3 strategies to protect your information system from internet scans (and resulting attacks)

In the previous two articles, we presented the issue of service exposure on the internet, as well as 10 cyber attacks that exploited the principle of exposure. Today, we want to revisit three common strategies that companies use to address this problem. As remote access needs and teleworking have particularly increased in recent years, what are the common strategies that companies choose to prevent their exposed services from becoming a gateway for hackers?

Continue reading

230522-3strategie


Chimere is joining the Thales Cyber@Station F program

The Thales Cyber@Station F startup acceleration program is launching its 6th season with the support of 7 startups, including Chimere. This new season begins on May 11th and will last for a period of seven months.

Continue reading

230512-thales-station-f


10 cyberattacks that exploited the principle of exposure

In the previous article, we highlighted the exposure of services on the internet, its origin, and the associated risks. In this article, we revisit ten cyberattacks that took advantage of the principle of exposure to succeed. Whether it was exploiting vulnerabilities, configuration defects, phishing techniques, or a combination of these different vectors, these are the elements that the targeted companies or investigative commissions were able to reveal following a post-mortem analysis of the attacks.

Continue reading

230509-attaques


Information System security: understanding the issue of exposure

One of the weaknesses of TCP/IP is still not solved today: the exposure of services.

If there is a network and security issue as old as the Internet, it is certainly the issue of service exposure. The internet network allows anyone to make services accessible through two pieces of information: an IP address, usually encoded on 4 bytes, and a port encoded on 2 bytes. Most of the time, knowledge of this information is sufficient to establish a connection with the associated application, regardless of the user's profile, whether legitimate or an attacker. By delving a little deeper, one realizes that it is the cause of the majority of intrusions within information systems. Let's take a closer look at a mechanism that is ubiquitous on the Internet and within private networks.

Continue reading

ARPANET


Forum International de la Cybersécurité

Lille, France

FIC
We will be present at the International Cybersecurity Forum from April 5th to 7th in Lille in the Innovation Village. Come to meet us and exchange around Chimere. See you on the booth F19-10!


Happy New Year 2023!

Aix-en-Provence, France

🎉🎉 2023 : an on-going adventure 🎉🎉

Chimere wishes you all a happy new year 2023!

🚀 Comming :

➜ Product launch

➜ Recruitments

➜ Events


International Forum of Cybersecurity

In Lille, France

FIC
We will be present at the International Cybersecurity Forum from June 7 to 9 in Lille on the Thales booth. Come to meet us and exchange around Chimere. See you at booth B9!


Thales Media Day

In Paris, France

darknet Chimere
During the THALES MEDIA DAY in Paris, the team had the chance to present the concept of cyberstealth and the solution to a group of national and international journalists.

Demonstration video