Cyber for all
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
Cyberattacks against the video game industry and gamers
Cyberattacks against the video game industry have surged in recent years, with the aim of extorting companies and stealing user accounts to sell them illegally After several delays[...]
Read more
5 Benefits of Cybersecurity Services for SMEs
Assessing risks, implementing effective measures, and responding to incidents are just some of the benefits of cybersecurity services for small and medium-sized businesses[...]
Read more
Can hostile actors geolocate people of interest?
Geolocating people of interest in real time by attacking their cell phones or IoT devices poses a major threat to companies and institutions[...]
Read more
Cybersecurity for medical devices is critical for manufacturers and hospitals
Technological advances are essential for caring for our health, but they also force manufacturers and hospitals to take into account the cybersecurity of medical devices[...]
Read more
Intellectual property and cybersecurity. A critical combination for businesses
Cyberattacks targeting corporate secrets highlight the vital link between intellectual property and cybersecurity[...]
Read more
Internal security threats. A growing risk for companies
Companies must have strategies in place to deal not only with cyberattacks, but also with internal security threats[...]
Read more
The EU may ban high-risk foreign suppliers to protect critical ICT supply chains
The Commission has drawn up a proposal for a regulation that includes measures to protect critical ICT supply chains from cyber threats[...]
Read more
Paste & Run: Executing malicious commands on corporate computers
The Paste & Run technique combines social engineering and malware to infect professionals' computers and gain access to the information they store[...]
Read more
The 10 most dangerous software vulnerabilities
CISA and MITRE have published their annual list of the most dangerous software vulnerabilities to help manufacturers and companies protect themselves against attacks A few days ago[...]
Read more
Telephone scams impersonating telecommunications or electricity companies: Latest trends
In recent years, there has been a proliferation of telephone scams impersonating telecommunications or electricity companies to obtain data or gain illegitimate access to accounts[...]
Read more