
Cyber for all
This blog is a windows on a complex world. An overlook to the universe of technology which drives our daily life, using a divulgative and enjoyable perspective

Mobile applications security standards: what they are and how to implement them
January 2025. It comes to light that thousands of mobile apps, including popular ones such as Candy Crush and Tinder, were collecting user data without their consent through the ad[...]
Read more
Why is it important to conduct a security audit on a mobile application, even if it is for internal use?
More than a hundred vulnerabilities per day. In other words, an attack vector of gigantic proportions. Mobile apps are currently under scrutiny in the cybersecurity world due to th[...]
Read more
LEV: What is the probability that a vulnerability has been exploited?
The LEV metric designed by NIST aims to help companies prioritize the mitigation of vulnerabilities affecting their digital assets[...]
Read more
Cyber intelligence against bank fraud
Cyber intelligence services are crucial in helping financial institutions effectively combat bank fraud and stay one step ahead of highly motivated criminals[...]
Read more
How to integrate security into the web application development cycle
Integrating security measures from the start of web application development is essential. You can learn how to do this in this article.[...]
Read more
Cyberattacks against the retail sector: Economic losses, reputational damage, and penalties
In recent months, cyberattacks against the retail sector have damaged the finances and reputation of large companies[...]
Read more
SAST, DAST, and SCA: How do these security tests differ?
Performing SAST, DAST, and SCA is essential to protect software throughout its lifecycle by detecting vulnerabilities before they are exploited A vulnerability affecting OttoKit, a[...]
Read more
8 obligations of the Cybersecurity Law for company executives
Supervise risk management, undergo continuous training, respond jointly for infringements… We review the obligations of the Cybersecurity Law for company executives This year[...]
Read more
Website source code audit: why is it important to do it?
By auditing the source code of a website, vulnerabilities can be detected before they are exploited and corrected in time Insecure design is one of the main security risks on a web[...]
Read more
Blockchain Pentesting: Why is it necessary?
The number and density of attacks on platforms that operate with blockchain, especially cryptocurrencies, have stimulated the debate on the convenience of protecting them with high[...]
Read more