
Cyber for all - Page 16
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Security audit: Knowing system vulnerabilities
Through a security audit, you can gather all the relevant information to know the vulnerabilities of the system and protect the business[...]
Read more
OWASP methodology, the beacon illuminating cyber risks
The OWASP methodology has become a standard in the cybersecurity world for detecting and correcting vulnerabilities[...]
Read more
Honeypot and other Deception techniques, when the good guys spy on the bad guys
Honeypots in particular, and Deception techniques in general, have become a useful tool for detecting intrusions into company systems and unravelling the modus operandi of hostile [...]
Read more
Cyber-attacks on mobile phones, the bloodletting that never stops
The number of cyber-attacks on mobile phones is growing all over the world, as is the volume of threats. Malware, ransomware...[...]
Read more
10 (essential) tips for building a wall of cyber defenses
Tarlogic's Cybersecurity team has drawn up a basic manual for creating a minimum cyber defenses structure: limiting the exposure of services to the Internet, double authentication,[...]
Read more
Yes, hacking cars is going to be one of the problems of this era
Digitalization is ushering in a new era in the automotive industry, but it has also opened a door to hacking cars[...]
Read more
The stress as adversarial factor for cyber decision-making
Cyber decision-making is often conditioned by very short response times. High-level research analyzes the impact of stress in these situations[...]
Read more
4 lessons learned from Babuk’s source code
Black Arrow Tarlogic's threat hunting team analyzes Babuk's source code to unravel how one of the most active ransomware of 2021 operates[...]
Read more
Biden gets serious… What if Washington succeeds in changing the cyberattacks map?
USA is starting to offer million-dollar rewards to catch hostile groups. This aggressive response could shift the cyberattacks map to Europe and Asia[...]
Read more
Golang opens the door to full-blown ransomware
In recent months, a number of malicious codes developed with Golang have appeared, causing concern in the cybersecurity community[...]
Read more