![](https://www.tarlogic.com/wp-content/themes/Avada-Child-Theme/images/cyber-for-all_s.webp)
Cyber for all - Page 4
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective
![What will the future of AI and cybersecurity look like?](https://www.tarlogic.com/wp-content/uploads/2024/01/IA-ciberseguridad-futuro-1.webp)
What will the future of AI and cybersecurity look like?
The relationship between AI and cybersecurity will be essential to protect companies and institutions against increasingly sophisticated and dangerous cyberattacks On May 11, 1997,[...]
Read more![Cyber-attacks against industries such as mining and metallurgy](https://www.tarlogic.com/wp-content/uploads/2023/12/Ciberataques-contra-industrias-1.webp)
Cyber-attacks against industries such as mining and metallurgy
Industrial espionage, intellectual property theft or paralysis of activity are some targets of cyber-attacks against industries Almost a year ago, the Canadian mining company CMMC [...]
Read more![AI, deepfake, and the evolution of CEO fraud](https://www.tarlogic.com/wp-content/uploads/2023/12/Fraude-del-CEO-y-deepfake.webp)
AI, deepfake, and the evolution of CEO fraud
Cybercriminals use deep fakes to execute a more sophisticated CEO fraud that is harder for the victim to detect In 2019, Empresa Municipal de Transportes de Valencia suffered a €[...]
Read more![Compromise Assessment: How to detect malicious actors](https://www.tarlogic.com/wp-content/uploads/2023/12/Compromise-Assessment-1.webp)
Compromise Assessment: How to detect malicious actors
Compromise Assessment allows you to detect signs of compromise and analyze the malicious activities detected against companies, as well as their scope and impact Not all attacks ha[...]
Read more![Artificial Intelligence Fraud: New Technology, Old Targets](https://www.tarlogic.com/wp-content/uploads/2023/11/Fraudes-con-Inteligencia-Artificial.webp)
Artificial Intelligence Fraud: New Technology, Old Targets
Identity theft is one of the critical elements of Artificial Intelligence fraud that threatens companies, administrations and citizens In 2021, a well-known brewing company relied [...]
Read more![Digital asset theft: Easy money for cybercriminals](https://www.tarlogic.com/wp-content/uploads/2023/11/Robo-de-activos-digitales-1.webp)
Digital asset theft: Easy money for cybercriminals
Digital asset theft is an easily monetized fraud that involves the theft and sale of gift card codes, reloads and pins A grandfather goes to a store that sells gift and prepaid car[...]
Read more![Black Friday alert! 10 keys to cyber-attacks against e-commerce and their customers](https://www.tarlogic.com/wp-content/uploads/2023/11/Ciberataques-contra-los-ecommerce-1.webp)
Black Friday alert! 10 keys to cyber-attacks against e-commerce and their customers
Malicious actors are taking advantage of Black Friday to launch cyber-attacks against e-commerce companies and carry out fraud against them and their customers The time when the su[...]
Read more![How do cybercriminals carry out fraud in the tourism sector?](https://www.tarlogic.com/wp-content/uploads/2023/11/Fraudes-en-el-sector-turistico.webp)
How do cybercriminals carry out fraud in the tourism sector?
Malicious actors employ social engineering techniques and malware to carry out fraud in the tourism sector and defraud travelers In recent weeks, multiple travel industry scams hav[...]
Read more![CVSS v4: Assessing vulnerabilities to prioritize their mitigation](https://www.tarlogic.com/wp-content/uploads/2023/06/CVSS-V4.webp)
CVSS v4: Assessing vulnerabilities to prioritize their mitigation
CVSS v4 expands the focus on the issues to be taken into account when assessing IT vulnerabilities and making decisions to remediate them Even today, many people are still unaware [...]
Read more![Top Ten Cybersecurity Misconfigurations](https://www.tarlogic.com/wp-content/uploads/2023/10/Cybersecurity-Misconfigurations-1.webp)
Top Ten Cybersecurity Misconfigurations
The NSA and CISA have created the Top 10 cybersecurity misconfigurations to help companies mitigate vulnerabilities If in the 20th century, many American movies, series and books t[...]
Read more