Cyber for all
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
These are the most common security breaches in mobile applications in the Play Store and App Store
Trojans such as Joker, Fleckpe or Autolycos, spy codes, “benign” apps that become malicious in a second phase… Security breaches in mobile applications have been [...]
Read more10 tips to avoid cyber-attacks on Black Friday
Cyber-attacks on Black Friday can damage a company’s sales, cause data loss and lead to scams and frauds against consumers and businesses Consumers will spend hundreds of eur[...]
Read moreClickbait scams: Curiosity swindled the cat
Clickbait scams generate interest in people with surprising or alarming news to get them to click on malicious links “Could the Golden Gate collapse?”, “The surpr[...]
Read moreThis is how company employees usually “sting” in Red Team exercises
In Red Team exercises, it is necessary to deceive company employees to achieve the objectives set. Bad cybersecurity practices, carelessness, lack of knowledge, low awareness of th[...]
Read moreCybersecurity and data protection: Companies face fines in the millions of dollars
Cybersecurity and data protection are two closely related strategic issues, as a cyber-attack can lead to the breach of customer data At the end of September 2024, the Irish Data P[...]
Read moreExploitation of zero-day vulnerabilities puts companies in check
Exploitation of zero-day vulnerabilities has grown in recent years and challenges companies’ cybersecurity strategies 70% of the vulnerabilities exploited in 2023 were zero-d[...]
Read moreThe challenges of teleworking at the enterprise security level: how to avoid a security breach
Cybersecurity services are critical in meeting the challenges of teleworking at the enterprise security level and avoiding serious incidents Telework existed before the world was c[...]
Read moreWhat methodologies are commonly used in Red Team exercises?
The Red Team methodology allows cybersecurity professionals to simulate attacks against companies and contribute to improving their resilience to real incidents. In team sports suc[...]
Read moreWhen will the NIS2 directive be implemented in Spain?
October 17 is the deadline for the NIS2 directive to be transposed in Spain, so companies must be prepared to adapt to its provisions RGPD, DORA, NIS2… The European Union is [...]
Read moreFake job offers. When a job opportunity turns into a nightmare
Criminal groups design fake job offers to infect professionals’ devices with malware and gain access to valuable information A worker receives an email that catches his atten[...]
Read more