
Cyber for all
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Paying a ransom after a cyberattack: Can you and should you?
Cybersecurity experts and public authorities strongly advise companies against paying ransom after a cyberattack[...]
Read more
Hardware and software that have reached End-of-Life: How to Avoid the Security Risks of Using Outdated Programs and Devices
Companies must update their programmes and devices and stop using hardware and software that have reached End-of-Life to prevent attacks[...]
Read more
Cyberattacks against AI chatbots. A new threat for businesses
Cyberattacks against AI chatbots are a growing threat to companies that use this technology in commerce or customer service[...]
Read more
Cyberattacks against airlines
In recent months, there have been several cyberattacks against airlines that have affected their operations and caused economic losses[...]
Read more
Stealing customer purchase histories. A new target for cybercriminals
In recent months, there have been cyberattacks against large companies in which hostile actors managed to steal customer purchase histories[...]
Read more
Best practices for developing a secure mobile app
Use strong encryption, establish robust authentication mechanisms, and verify incoming data… We review the best practices for developing a secure mobile app. Infecting millions o[...]
Read more
ClickFix technique: How to get the victim to infect their computer
Malicious actors use the ClickFix technique to trick their victims into downloading and installing malware on their devices When we say that malicious actors never stop innovating,[...]
Read more
What is a Red Team assessment and why are they so important?
Project information, confidential documents, invoices, source code for solutions developed by the company… This is the information that the malicious group HellCat claims to have[...]
Read more
Mobile applications security standards: what they are and how to implement them
January 2025. It comes to light that thousands of mobile apps, including popular ones such as Candy Crush and Tinder, were collecting user data without their consent through the ad[...]
Read more
Why is it important to conduct a security audit on a mobile application, even if it is for internal use?
More than a hundred vulnerabilities per day. In other words, an attack vector of gigantic proportions. Mobile apps are currently under scrutiny in the cybersecurity world due to th[...]
Read more