
Cyber for all
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Cyber intelligence against bank fraud
Cyber intelligence services are crucial in helping financial institutions effectively combat bank fraud and stay one step ahead of highly motivated criminals[...]
Read more
How to integrate security into the web application development cycle
Integrating security measures from the start of web application development is essential. You can learn how to do this in this article.[...]
Read more
Cyberattacks against the retail sector: Economic losses, reputational damage, and penalties
In recent months, cyberattacks against the retail sector have damaged the finances and reputation of large companies[...]
Read more
SAST, DAST, and SCA: How do these security tests differ?
Performing SAST, DAST, and SCA is essential to protect software throughout its lifecycle by detecting vulnerabilities before they are exploited A vulnerability affecting OttoKit, a[...]
Read more
8 obligations of the Cybersecurity Law for company executives
Supervise risk management, undergo continuous training, respond jointly for infringements… We review the obligations of the Cybersecurity Law for company executives This year[...]
Read more
Website source code audit: why is it important to do it?
By auditing the source code of a website, vulnerabilities can be detected before they are exploited and corrected in time Insecure design is one of the main security risks on a web[...]
Read more
Blockchain Pentesting: Why is it necessary?
The number and density of attacks on platforms that operate with blockchain, especially cryptocurrencies, have stimulated the debate on the convenience of protecting them with high[...]
Read more
No milk at the supermarket? The importance of cybersecurity in the food sector
Companies must strengthen cybersecurity in the food sector to avoid serious incidents that paralyze their activities and cause millions in losses A few days ago, it was announced o[...]
Read more
Cyberattacks against industrial and business routers
Cyberattacks against routers pose a dangerous threat to companies in the industrial sector where IIoT devices and ICS systems are used At the end of 2024, it was made public that t[...]
Read more
Why antivirus and security suites are not enough to keep your information safe
Almost half of the SMEs does not have an incident response plan, and a third of these companies do not offer any type of cybersecurity training to their staff. In many cases, their[...]
Read more