Cyber ​​attack

Veeam: what is the real value of cyber insurance?

Veeam: what is the real value of cyber insurance?

The threat of cyber attacks is nothing new, but ransomware is proving to be much more effective than ever…

March 19 2024

Attacks via QR codes: here are the tips from Cisco Talos

How many times have we used a QR code to subscribe to a newsletter, to read the programming of…

March 13 2024

NTT DATA UK&I teams up with Security Scorecard to transform cyber risk monitoring across the UK and Ireland

A response to the request for greater visibility on security and continuous supervision on cyber risks by ...

February 13 2024

Verimatrix will present the most innovative cybersecurity technology at the IBC Conference

Verimatrix, the leader in powering the modern connected world with human-centric security, announced today that it will highlight…

February 13 2024

Hillstone Networks CTO Tim Liu discusses cybersecurity trends for 2024

Hillstone Networks has published the annual retrospective and forecasts from the CTO Room. In 2024 the cybersecurity sector…

December 27 2023

Coinnect presents Ransomware Intelligence Global Report 2023

Ransomware Intelligence Global Report 2023, a comprehensive overview of ransomware attacks recorded by global organizations in 2021 and 2022…

February 8 2023

The National Cybersecurity Agency reports ransomware attacks around the world

The National Cybersecurity Agency's Computer Security Incident Response team said it had detected a massive attack…

February 8 2023

Coinnect joins ITC DIA Europe Top 100 Insurtechs to Watch in 2023

The innovative start-up of cyber innovators is among the very few insurtech companies included in the prestigious list drawn up this year by…

January 9 2023

Cyber ​​attack: what it is, how it works, objective and how to prevent it: Brute force attack

A cyber attack is definible as hostile activity against a system, tool, application, or…

August 31 2022

Cyber ​​attack: what it is, how it works, objective and how to prevent it: example of malware that spies the inbox on gmail

Gmail users should keep an eye out for the new SHARPEXT malware, discovered by cybersecurity company Volexity. A cyber attack ...

August 24 2022

Cyber ​​attack: what it is, how it works, objective and how to prevent it: Denial-of-service (DoS) attack

A cyber attack is definible as hostile activity against a system, tool, application, or…

August 17 2022

Yanluowang Gang ransomware hacked into the Cisco corporate network

The Yanluowang ransomware gang hacked into Cisco's corporate network at the end of May and stole corporate information,…

August 12 2022

Cyber ​​attack: what it is, how it works, objective and how to prevent it: Birthday attack

A cyber attack is definible as hostile activity against a system, tool, application, or…

August 10 2022

Cyber ​​attack: what it is, how it works, objective and how to prevent it: XSS bugs that can cause a complete system shutdown

Let's see today some Cross Site Scripting (XSS) vulnerabilities found in some open source applications, and which can cause execution ...

August 3 2022

LockBit Ransomware Gang targets the Italian Revenue Agency

Over the weekend, the Lockbit ransomware gang revealed that they had breached the security systems of the ...

July 29 2022

Cyber ​​attack: what it is, how it works, objective and how to prevent it: Attack on passwords

A cyber attack is definible as hostile activity against a system, tool, application, or…

July 27 2022

Cyber ​​attack: what it is, how it works, objective and how to prevent it: example of the spread of Malware

A Malware cyber attack is definible as hostile activity against a system, tool, application, or…

July 20 2022

Cyber ​​attack: what it is, how it works, objective and how to prevent it: SQL injection attack

A cyber attack is definible as hostile activity against a system, tool, application, or…

July 13 2022

Cyber ​​attack: what it is, how it works, goal and how to prevent it: Cross-site scripting attack (XSS)

A cyber attack is definible as hostile activity against a system, tool, application, or…

July 6 2022

Cyber ​​attack: what it is, how it works, objective and how to prevent it: Drive-by attack

A cyber attack is definible as hostile activity against a system, tool, application, or…

June 29 2022