Cyber for all

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Car cybersecurity: What measures should manufacturers put in place?
Car cybersecurity: What measures should manufacturers put in place?

Current regulations require manufacturers to have a cybersecurity management system in place for cars and trucks to prevent security incidents and limit their impact should they oc[...]

Read more
Exploitation of vulnerabilities for which patches already exist. A preventable threat looming over businesses
Exploitation of vulnerabilities for which patches already exist. A preventable threat looming over businesses

Exploiting vulnerabilities for which a patch already exists can lead to security incidents that could be prevented with efficient vulnerability management A few weeks ago, cybersec[...]

Read more
Cyberattacks against the video game industry and gamers
Cyberattacks against the video game industry and gamers

Cyberattacks against the video game industry have surged in recent years, with the aim of extorting companies and stealing user accounts to sell them illegally After several delays[...]

Read more
5 Benefits of Cybersecurity Services for SMEs
5 Benefits of Cybersecurity Services for SMEs

Assessing risks, implementing effective measures, and responding to incidents are just some of the benefits of cybersecurity services for small and medium-sized businesses[...]

Read more
Can hostile actors geolocate people of interest?
Can hostile actors geolocate people of interest?

Geolocating people of interest in real time by attacking their cell phones or IoT devices poses a major threat to companies and institutions[...]

Read more
Cybersecurity for medical devices is critical for manufacturers and hospitals
Cybersecurity for medical devices is critical for manufacturers and hospitals

Technological advances are essential for caring for our health, but they also force manufacturers and hospitals to take into account the cybersecurity of medical devices[...]

Read more
Intellectual property and cybersecurity. A critical combination for businesses
Intellectual property and cybersecurity. A critical combination for businesses

Cyberattacks targeting corporate secrets highlight the vital link between intellectual property and cybersecurity[...]

Read more
Internal security threats. A growing risk for companies
Internal security threats. A growing risk for companies

Companies must have strategies in place to deal not only with cyberattacks, but also with internal security threats[...]

Read more
The EU may ban high-risk foreign suppliers to protect critical ICT supply chains
The EU may ban high-risk foreign suppliers to protect critical ICT supply chains

The Commission has drawn up a proposal for a regulation that includes measures to protect critical ICT supply chains from cyber threats[...]

Read more
Paste & Run: Executing malicious commands on corporate computers
Paste & Run: Executing malicious commands on corporate computers

The Paste & Run technique combines social engineering and malware to infect professionals' computers and gain access to the information they store[...]

Read more
1 2 3 4 20