Cyber for all

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Paste & Run: Executing malicious commands on corporate computers
Paste & Run: Executing malicious commands on corporate computers

The Paste & Run technique combines social engineering and malware to infect professionals' computers and gain access to the information they store[...]

Read more
The 10 most dangerous software vulnerabilities
The 10 most dangerous software vulnerabilities

CISA and MITRE have published their annual list of the most dangerous software vulnerabilities to help manufacturers and companies protect themselves against attacks A few days ago[...]

Read more
Telephone scams impersonating telecommunications or electricity companies: Latest trends
Telephone scams impersonating telecommunications or electricity companies: Latest trends

In recent years, there has been a proliferation of telephone scams impersonating telecommunications or electricity companies to obtain data or gain illegitimate access to accounts[...]

Read more
How to strengthen the security of the mainframe, the heart of a bank, government, or airline
How to strengthen the security of the mainframe, the heart of a bank, government, or airline

Banks, public administrations, insurance companies, airlines, and multinational retailers must protect the security of the mainframe they use to prevent unauthorized access[...]

Read more
Remote Access Trojans (RAT): Sophisticated and difficult-to-detect malware
Remote Access Trojans (RAT): Sophisticated and difficult-to-detect malware

Remote Access Trojans are a threat to businesses, citizens, and organizations in critical sectors such as healthcare VenomRAT, MysterySnail RAT, NodeSnake RAT, ResolverRAT, Stilach[...]

Read more
Beware of infostealers on Black Friday and Christmas
Beware of infostealers on Black Friday and Christmas

Malicious actors will use infostealers on Black Friday and Christmas to infiltrate companies at a critical time for their operations, as there will be much more traffic to retail w[...]

Read more
A cyberattack can paralyze a company’s online sales for weeks
A cyberattack can paralyze a company’s online sales for weeks

If a cyberattack manages to paralyze a company's online sales, the economic and reputational consequences are very serious[...]

Read more
Benefits of an AI security audit
Benefits of an AI security audit

Preventing prompt injections and sensitive information leaks are some of the benefits of an AI security audit for companies that use this technology[...]

Read more
Open Banking and PSD2 for much more than financial services
Open Banking and PSD2 for much more than financial services

Real estate has begun to use creditworthiness assessments backed by Open Banking platforms and the PSD2 directive[...]

Read more
Cyberattacks that affect business continuity are a critical threat to companies
Cyberattacks that affect business continuity are a critical threat to companies

Companies in multiple sectors have suffered cyberattacks that affect business continuity and cause serious economic and reputational damage Cybercriminals can be faster than the wo[...]

Read more
1 2 3 4 19