Cyber for all - Page 2

This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

OWASP: Top 10 Mobile Application Risks
OWASP: Top 10 Mobile Application Risks

The OWASP Top 10 Mobile Application Risks includes the most critical vulnerabilities that criminals can exploit As the saying goes, good things come to those who wait. Eight years [...]

Read more
Tips to avoid becoming a victim of CEO fraud and other impersonation attempts
Tips to avoid becoming a victim of CEO fraud and other impersonation attempts

To avoid becoming a victim of CEO fraud, be wary of any suspicious communication ordering a transfer or disclosing information. 38 million euros. This was the haul made by a Franco[...]

Read more
Cyber-attacks against the education sector. When criminals go to university
Cyber-attacks against the education sector. When criminals go to university

Cyber-attacks against the education sector can paralyse universities and research centres and lead to personal data and intellectual property theft In mid-June, right at the end of[...]

Read more
Responding to a cyber-attack in less than 1 hour
Responding to a cyber-attack in less than 1 hour

Readiness Assessment is a proactive Incident Response task that allows you to respond to a cyber-attack in minutes and minimize its impact 49 million dollars. That’s how much[...]

Read more
Cryptocurrency fraud, social media hacking, malware, and AI
Cryptocurrency fraud, social media hacking, malware, and AI

Social media hacking, crypto drainers and malicious use of generative AIs are enabling criminals to commit more sophisticated cryptocurrency frauds 2024 has started with turbulence[...]

Read more
Medical data theft. A high-voltage threat
Medical data theft. A high-voltage threat

Attacks on hospitals, insurers and healthcare software companies are on the rise, targeting medical data theft The worst-case scenario for a hospital is that its activities are par[...]

Read more
What will the future of AI and cybersecurity look like?
What will the future of AI and cybersecurity look like?

The relationship between AI and cybersecurity will be essential to protect companies and institutions against increasingly sophisticated and dangerous cyberattacks On May 11, 1997,[...]

Read more
Cyber-attacks against industries such as mining and metallurgy
Cyber-attacks against industries such as mining and metallurgy

Industrial espionage, intellectual property theft or paralysis of activity are some targets of cyber-attacks against industries Almost a year ago, the Canadian mining company CMMC [...]

Read more
AI, deepfake, and the evolution of CEO fraud
AI, deepfake, and the evolution of CEO fraud

Cybercriminals use deep fakes to execute a more sophisticated CEO fraud that is harder for the victim to detect In 2019, Empresa Municipal de Transportes de Valencia suffered a €[...]

Read more
Compromise Assessment: How to detect malicious actors
Compromise Assessment: How to detect malicious actors

Compromise Assessment allows you to detect signs of compromise and analyze the malicious activities detected against companies, as well as their scope and impact Not all attacks ha[...]

Read more
1 2 3 4 5 11