Cyber for all - Page 6

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Compromise Assessment: How to detect malicious actors
Compromise Assessment: How to detect malicious actors

Compromise Assessment allows you to detect signs of compromise and analyze the malicious activities detected against companies, as well as their scope and impact Not all attacks ha[...]

Read more
Artificial Intelligence Fraud: New Technology, Old Targets
Artificial Intelligence Fraud: New Technology, Old Targets

Identity theft is one of the critical elements of Artificial Intelligence fraud that threatens companies, administrations and citizens In 2021, a well-known brewing company relied [...]

Read more
Digital asset theft: Easy money for cybercriminals
Digital asset theft: Easy money for cybercriminals

Digital asset theft is an easily monetized fraud that involves the theft and sale of gift card codes, reloads and pins A grandfather goes to a store that sells gift and prepaid car[...]

Read more
Black Friday alert! 10 keys to cyber-attacks against e-commerce and their customers
Black Friday alert! 10 keys to cyber-attacks against e-commerce and their customers

Malicious actors are taking advantage of Black Friday to launch cyber-attacks against e-commerce companies and carry out fraud against them and their customers The time when the su[...]

Read more
How do cybercriminals carry out fraud in the tourism sector?
How do cybercriminals carry out fraud in the tourism sector?

Malicious actors employ social engineering techniques and malware to carry out fraud in the tourism sector and defraud travelers In recent weeks, multiple travel industry scams hav[...]

Read more
CVSS v4: Assessing vulnerabilities to prioritize their mitigation
CVSS v4: Assessing vulnerabilities to prioritize their mitigation

CVSS v4 expands the focus on the issues to be taken into account when assessing IT vulnerabilities and making decisions to remediate them Even today, many people are still unaware [...]

Read more
Top Ten Cybersecurity Misconfigurations
Top Ten Cybersecurity Misconfigurations

The NSA and CISA have created the Top 10 cybersecurity misconfigurations to help companies mitigate vulnerabilities If in the 20th century, many American movies, series and books t[...]

Read more
RDDoS attacks and DDoS-as-a-Service: Extortion and Business Continuity
RDDoS attacks and DDoS-as-a-Service: Extortion and Business Continuity

RDDoS attacks pose a growing threat to all kinds of companies which see their business continuity threatened by criminals As we have learned from mafia movies, from The Godfather t[...]

Read more
Cyberattacks against the healthcare sector put people’s well-being at risk
Cyberattacks against the healthcare sector put people’s well-being at risk

Cyberattacks against the healthcare sector have economic consequences and can affect people’s well-being At the beginning of the year, and within days of each other, one of S[...]

Read more
Cyber resilience. A concept that combines security and business
Cyber resilience. A concept that combines security and business

Companies must have strategies to improve cyber resilience and ensure business continuity during attacks A few days ago, the Spanish National Police warned about a new distribution[...]

Read more
1 3 4 5 6 7 8 9 14