Cyber for all

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Website source code audit: why is it important to do it?
Website source code audit: why is it important to do it?

By auditing the source code of a website, vulnerabilities can be detected before they are exploited and corrected in time Insecure design is one of the main security risks on a web[...]

Read more
Blockchain Pentesting: Why is it necessary?
Blockchain Pentesting: Why is it necessary?

The number and density of attacks on platforms that operate with blockchain, especially cryptocurrencies, have stimulated the debate on the convenience of protecting them with high[...]

Read more
No milk at the supermarket? The importance of cybersecurity in the food sector
No milk at the supermarket? The importance of cybersecurity in the food sector

Companies must strengthen cybersecurity in the food sector to avoid serious incidents that paralyze their activities and cause millions in losses A few days ago, it was announced o[...]

Read more
Cyberattacks against industrial and business routers
Cyberattacks against industrial and business routers

Cyberattacks against routers pose a dangerous threat to companies in the industrial sector where IIoT devices and ICS systems are used At the end of 2024, it was made public that t[...]

Read more
Why antivirus and security suites are not enough to keep your information safe
Why antivirus and security suites are not enough to keep your information safe

Almost half of the SMEs does not have an incident response plan, and a third of these companies do not offer any type of cybersecurity training to their staff. In many cases, their[...]

Read more
Between €180,000 and €2 million. This will be the cost of the Cybersecurity Law for companies
Between €180,000 and €2 million. This will be the cost of the Cybersecurity Law for companies

Almost 6,000 Spanish companies will have to adapt their strategies to optimize their capacity to manage incidents and assume the cost of the Cybersecurity Law Three months behind t[...]

Read more
What is the difference between cloud penetration testing and regular penetration testing?
What is the difference between cloud penetration testing and regular penetration testing?

A few days ago it became public that malicious actors are exploiting a critical vulnerability in Aviatrix, a solution that allows companies to manage their cloud infrastructure thr[...]

Read more
Testing web security: why automated tools can be insufficient
Testing web security: why automated tools can be insufficient

For many companies, every minute that a website is down is a huge financial loss. Corporate web applications are business tools, especially in the case of ecommerce, and often stor[...]

Read more
Threat Hunting & Incident Response: Two complementary and necessary services
Threat Hunting & Incident Response: Two complementary and necessary services

35 million dollars. This is the amount of losses caused by a cyber-attack on Halliburton, a multinational energy company, in August. Although the figure is shocking, the consequenc[...]

Read more
How will the Cybersecurity Coordination and Governance Act affect businesses?
How will the Cybersecurity Coordination and Governance Act affect businesses?

The draft Cybersecurity Coordination and Governance Act contemplates fines of up to 10 million euros for non-compliant companies Thousands of Spanish companies have been wondering [...]

Read more
1 2 3 4 15