Cyber for all

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

TLPT tests: What are they and which companies should perform them?
TLPT tests: What are they and which companies should perform them?

TLPTs are threat-based penetration tests that many financial sector entities must undergo starting in January 2025 Ever since humankind invented it, money has always attracted crim[...]

Read more
Cyberattacks can paralyze a company’s activity
Cyberattacks can paralyze a company’s activity

Security incidents can undermine business continuity and paralyze a company’s activity, generating substantial losses 87% of SMEs fear that a cyber-attack could paralyze a co[...]

Read more
MITRE ATLAS: How can AI be attacked?
MITRE ATLAS: How can AI be attacked?

MITRE ATLAS is a framework that systematizes malicious actors’ tactics and techniques to attack AI systems Both the public bodies in charge of ensuring the cybersecurity of t[...]

Read more
AI Act: Cybersecurity requirements for high-risk AI systems
AI Act: Cybersecurity requirements for high-risk AI systems

  The Artificial Intelligence Act sets out what cybersecurity requirements for high-risk AI systems must be met in the European Union Few regulations have generated more buzz [...]

Read more
Vulnerability assessment versus penetration testing. What are the differences?
Vulnerability assessment versus penetration testing. What are the differences?

Vulnerability assessment and penetration testing are compatible exercises that allow for the detection of vulnerabilities in corporate infrastructures and the prioritization of the[...]

Read more
A wave of digital fraud to citizens
A wave of digital fraud to citizens

Digital frauds to citizens are on the rise, and more sophisticated typologies have emerged to manage to deceive people and scam them «I have something to tell you; add me to Whats[...]

Read more
Malicious mobile apps: Do you know what you install on your smartphone?
Malicious mobile apps: Do you know what you install on your smartphone?

Malicious mobile applications allow smartphones to be infected with malware to commit bank fraud or spy on people and companies Photos, videos, documents, messages, applications[...]

Read more
How can criminals bypass multi-factor authentication (MFA)?
How can criminals bypass multi-factor authentication (MFA)?

Several types of attacks allow malicious actors to bypass multi-factor authentication and take control of corporate and personal accounts In recent years, software-as-a-service (Sa[...]

Read more
Cyber-attacks on the Olympic Games. Bad guys go for the gold at Paris 2024
Cyber-attacks on the Olympic Games. Bad guys go for the gold at Paris 2024

Cyber-attacks at the Olympic Games pose a threat to organizers, suppliers, involved sectors and even sports fans While broadcasters worldwide were broadcasting the opening ceremony[...]

Read more
Cyber-attacks against the defence sector. A new war front
Cyber-attacks against the defence sector. A new war front

The sophistication and impact of cyber-attacks against the defence sector force organisations to improve their cyber resilience against advanced persistent threats In early 2024, U[...]

Read more
1 2 3 4 13