
Cyber for all
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Banking trojans. How can they steal your wallet from your smartphone?
Banking Trojans are a type of malware that allows criminals to access their victims' bank accounts and cryptocurrency wallets[...]
Read more
Enterprise software cybersecurity
Companies that use CRM, ERP and other programmes in their day-to-day operations must place enterprise software cybersecurity at the heart of their strategy[...]
Read more
Paying a ransom after a cyberattack: Can you and should you?
Cybersecurity experts and public authorities strongly advise companies against paying ransom after a cyberattack[...]
Read more
Hardware and software that have reached End-of-Life: How to Avoid the Security Risks of Using Outdated Programs and Devices
Companies must update their programmes and devices and stop using hardware and software that have reached End-of-Life to prevent attacks[...]
Read more
Cyberattacks against AI chatbots. A new threat for businesses
Cyberattacks against AI chatbots are a growing threat to companies that use this technology in commerce or customer service[...]
Read more
Cyberattacks against airlines
In recent months, there have been several cyberattacks against airlines that have affected their operations and caused economic losses[...]
Read more
Stealing customer purchase histories. A new target for cybercriminals
In recent months, there have been cyberattacks against large companies in which hostile actors managed to steal customer purchase histories[...]
Read more
Best practices for developing a secure mobile app
Use strong encryption, establish robust authentication mechanisms, and verify incoming data… We review the best practices for developing a secure mobile app. Infecting millions o[...]
Read more
ClickFix technique: How to get the victim to infect their computer
Malicious actors use the ClickFix technique to trick their victims into downloading and installing malware on their devices When we say that malicious actors never stop innovating,[...]
Read more
What is a Red Team assessment and why are they so important?
Project information, confidential documents, invoices, source code for solutions developed by the company… This is the information that the malicious group HellCat claims to have[...]
Read more