Cyber for all

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Stealing customer purchase histories. A new target for cybercriminals
Stealing customer purchase histories. A new target for cybercriminals

In recent months, there have been cyberattacks against large companies in which hostile actors managed to steal customer purchase histories[...]

Read more
Best practices for developing a secure mobile app
Best practices for developing a secure mobile app

Use strong encryption, establish robust authentication mechanisms, and verify incoming data… We review the best practices for developing a secure mobile app. Infecting millions o[...]

Read more
ClickFix technique: How to get the victim to infect their computer
ClickFix technique: How to get the victim to infect their computer

Malicious actors use the ClickFix technique to trick their victims into downloading and installing malware on their devices When we say that malicious actors never stop innovating,[...]

Read more
What is a Red Team assessment and why are they so important?
What is a Red Team assessment and why are they so important?

Project information, confidential documents, invoices, source code for solutions developed by the company… This is the information that the malicious group HellCat claims to have[...]

Read more
Mobile applications security standards: what they are and how to implement them
Mobile applications security standards: what they are and how to implement them

January 2025. It comes to light that thousands of mobile apps, including popular ones such as Candy Crush and Tinder, were collecting user data without their consent through the ad[...]

Read more
Why is it important to conduct a security audit on a mobile application, even if it is for internal use?
Why is it important to conduct a security audit on a mobile application, even if it is for internal use?

More than a hundred vulnerabilities per day. In other words, an attack vector of gigantic proportions. Mobile apps are currently under scrutiny in the cybersecurity world due to th[...]

Read more
LEV: What is the probability that a vulnerability has been exploited?
LEV: What is the probability that a vulnerability has been exploited?

The LEV metric designed by NIST aims to help companies prioritize the mitigation of vulnerabilities affecting their digital assets[...]

Read more
Cyber intelligence against bank fraud
Cyber intelligence against bank fraud

Cyber intelligence services are crucial in helping financial institutions effectively combat bank fraud and stay one step ahead of highly motivated criminals[...]

Read more
How to integrate security into the web application development cycle
How to integrate security into the web application development cycle

Integrating security measures from the start of web application development is essential. You can learn how to do this in this article.[...]

Read more
Cyberattacks against the retail sector: Economic losses, reputational damage, and penalties
Cyberattacks against the retail sector: Economic losses, reputational damage, and penalties

In recent months, cyberattacks against the retail sector have damaged the finances and reputation of large companies[...]

Read more
1 2 3 4 17