Cyber for all

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Red Team vs Blue Team: differences between two strategies to protect your business
Red Team vs Blue Team: differences between two strategies to protect your business

Since the great classical epics, humankind has been obsessed with epic conflicts: Greeks vs. Trojans, David vs. Goliath, Karpov vs. Kasparov… and Kasparov himself representin[...]

Read more
CRA Regulation: Increasing the security of the software and hardware we use
CRA Regulation: Increasing the security of the software and hardware we use

The CRA regulation imposes obligations on manufacturers, importers, and distributors to ensure secure software and hardware in the EU market Can the monitor a parent uses to monito[...]

Read more
What are the characteristics of a truly secure website?
What are the characteristics of a truly secure website?

The correct management of user permissions, the regular updating of software or the use of cryptographic protocols are some characteristics of a truly secure website. Web applicati[...]

Read more
How to report a security breach involving a personal data breach
How to report a security breach involving a personal data breach

In both the United States and Europe, it is mandatory to report a security breach in which the personal data of customers, employees or partners has been affected A few weeks ago, [...]

Read more
These are the most common security breaches in mobile applications in the Play Store and App Store
These are the most common security breaches in mobile applications in the Play Store and App Store

Trojans such as Joker, Fleckpe or Autolycos, spy codes, “benign” apps that become malicious in a second phase… Security breaches in mobile applications have been [...]

Read more
10 tips to avoid cyber-attacks on Black Friday
10 tips to avoid cyber-attacks on Black Friday

Cyber-attacks on Black Friday can damage a company’s sales, cause data loss and lead to scams and frauds against consumers and businesses Consumers will spend hundreds of eur[...]

Read more
Clickbait scams: Curiosity swindled the cat
Clickbait scams: Curiosity swindled the cat

Clickbait scams generate interest in people with surprising or alarming news to get them to click on malicious links “Could the Golden Gate collapse?”, “The surpr[...]

Read more
This is how company employees usually “sting” in Red Team exercises
This is how company employees usually “sting” in Red Team exercises

In Red Team exercises, it is necessary to deceive company employees to achieve the objectives set. Bad cybersecurity practices, carelessness, lack of knowledge, low awareness of th[...]

Read more
Cybersecurity and data protection: Companies face fines in the millions of dollars
Cybersecurity and data protection: Companies face fines in the millions of dollars

Cybersecurity and data protection are two closely related strategic issues, as a cyber-attack can lead to the breach of customer data At the end of September 2024, the Irish Data P[...]

Read more
Exploitation of zero-day vulnerabilities puts companies in check
Exploitation of zero-day vulnerabilities puts companies in check

Exploitation of zero-day vulnerabilities has grown in recent years and challenges companies’ cybersecurity strategies 70% of the vulnerabilities exploited in 2023 were zero-d[...]

Read more
1 2 3 4 14