Cyber for all - Page 5
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
What is SEO poisoning?
SEO poisoning is a malicious strategy in which social engineering techniques and malware are combined to commit fraud and attack companies What is the first thing you do when you n[...]
Read morePhishing as a Service: Kits to steal money and data from companies
Phishing as a Service platforms provide the infrastructure to launch social engineering campaigns against companies and citizens Not only malware or denial-of-service attacks can b[...]
Read moreTips for measuring the level of IT security in your company
Measuring a company’s IT security level is critical to detect and address weaknesses before criminals exploit them In early April, it became public knowledge that the US hote[...]
Read moreHow is a web security test carried out?
One of the most effective practices for controlling the resources allocated to cybersecurity is to perform a web security test In 2023, the most relevant security breaches detected[...]
Read moreIndustrial cyber espionage and theft of business secrets
Industrial cyber espionage and the theft of strategic information can lead to huge economic losses and damage to companies’ competitiveness At the end of December 2023, Akira[...]
Read moreThe Risks of Using Generative AI in Business: Protect Your Secrets
Companies developing AI systems and those contracting third-party applications should know the risks of using generative AI in business 2023 was the year that generative AI went ma[...]
Read moreHow do you test a company’s cybersecurity?
Continuously testing a company’s cybersecurity is essential to ensuring business continuity and preventing a cyber-attack from causing significant damage A few days ago, ther[...]
Read moreThe 16 types of malware used by criminals
Viruses, Trojans, spyware, ransomware… the types of malware used by malicious actors have multiplied and become more sophisticated Ransomware to extort money from companies a[...]
Read moreHow do you detect vulnerabilities in applications?
Security audits are essential to detect vulnerabilities in web and mobile applications before they are exploited. Just this February, the National Institute of Standards and Techno[...]
Read moreOWASP: Top 10 Mobile Application Risks
The OWASP Top 10 Mobile Application Risks includes the most critical vulnerabilities that criminals can exploit As the saying goes, good things come to those who wait. Eight years [...]
Read more