Cyber for all

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Internal security threats. A growing risk for companies
Internal security threats. A growing risk for companies

Companies must have strategies in place to deal not only with cyberattacks, but also with internal security threats[...]

Read more
The EU may ban high-risk foreign suppliers to protect critical ICT supply chains
The EU may ban high-risk foreign suppliers to protect critical ICT supply chains

The Commission has drawn up a proposal for a regulation that includes measures to protect critical ICT supply chains from cyber threats[...]

Read more
Paste & Run: Executing malicious commands on corporate computers
Paste & Run: Executing malicious commands on corporate computers

The Paste & Run technique combines social engineering and malware to infect professionals' computers and gain access to the information they store[...]

Read more
The 10 most dangerous software vulnerabilities
The 10 most dangerous software vulnerabilities

CISA and MITRE have published their annual list of the most dangerous software vulnerabilities to help manufacturers and companies protect themselves against attacks A few days ago[...]

Read more
Telephone scams impersonating telecommunications or electricity companies: Latest trends
Telephone scams impersonating telecommunications or electricity companies: Latest trends

In recent years, there has been a proliferation of telephone scams impersonating telecommunications or electricity companies to obtain data or gain illegitimate access to accounts[...]

Read more
How to strengthen the security of the mainframe, the heart of a bank, government, or airline
How to strengthen the security of the mainframe, the heart of a bank, government, or airline

Banks, public administrations, insurance companies, airlines, and multinational retailers must protect the security of the mainframe they use to prevent unauthorized access[...]

Read more
Remote Access Trojans (RAT): Sophisticated and difficult-to-detect malware
Remote Access Trojans (RAT): Sophisticated and difficult-to-detect malware

Remote Access Trojans are a threat to businesses, citizens, and organizations in critical sectors such as healthcare VenomRAT, MysterySnail RAT, NodeSnake RAT, ResolverRAT, Stilach[...]

Read more
Beware of infostealers on Black Friday and Christmas
Beware of infostealers on Black Friday and Christmas

Malicious actors will use infostealers on Black Friday and Christmas to infiltrate companies at a critical time for their operations, as there will be much more traffic to retail w[...]

Read more
A cyberattack can paralyze a company’s online sales for weeks
A cyberattack can paralyze a company’s online sales for weeks

If a cyberattack manages to paralyze a company's online sales, the economic and reputational consequences are very serious[...]

Read more
Benefits of an AI security audit
Benefits of an AI security audit

Preventing prompt injections and sensitive information leaks are some of the benefits of an AI security audit for companies that use this technology[...]

Read more
1 2 3 4 19