cybersecurity

COVID-19: The Many and Diverse Cyber ​​Incidents in Canada
Technology

COVID-19: The Many and Diverse Cyber ​​Incidents in Canada

(Photo: 123RF) An investigation conducted just under a month ago in Canada indicates that cyber incidents are numerous during the…
Ransomware: It’s time to bring cybersecurity audits to GDPR level
Technology

Ransomware: It’s time to bring cybersecurity audits to GDPR level

Cybersecurity standards should be treated in the same way as data protection law rules in response to cyber attacks, including…
Sekoia raises 10 million euros to accelerate the marketing of its cybersecurity platform
Technology

Sekoia raises 10 million euros to accelerate the marketing of its cybersecurity platform

Sekoia announced Tuesday, October 6, 2020 raised 10 million euros. A series A fundraiser for the French start-up which has…
Google and Fevad want to train small businesses in cybersecurity
Technology

Google and Fevad want to train small businesses in cybersecurity

On the occasion of cybersecurity month, the federation of e-commerce and distance selling (Fevad), Google and Cybermalveillance.gouv.fr are inaugurating a…
Cybersecurity: Your supply chain is now your weakest link
Technology

Cybersecurity: Your supply chain is now your weakest link

Over 80% of organizations have experienced a data breach due to security vulnerabilities in their supply chains, with cybercriminals taking…
Cybersecurity: hospitals more than ever on the front line
Technology

Cybersecurity: hospitals more than ever on the front line

Many healthcare establishments internationally have been impacted. Whether for example in the United States, with more than 500,000 records of…
A wave of Magecart attacks detected for the start of the school year
Technology

A wave of Magecart attacks detected for the start of the school year

Back to school, government and business firmly believe in the long-awaited economic recovery, so do cybercriminals. The Sansec company, which…
The vast majority of cyberattacks are believed to be used to “mine” cryptocurrency
Technology

The vast majority of cyberattacks are believed to be used to “mine” cryptocurrency

A study of cyber attacks recorded over one year on cloud servers reveals that the vast majority of hackers target…
Bitcoin: a major bug that remained silent for two years
Technology

Bitcoin: a major bug that remained silent for two years

In 2018, a security researcher discovered a major vulnerability in Bitcoin Core, the software that powers the Bitcoin blockchain, but…
Blindside: when speculative execution allows ASLR to be bypassed
Technology

Blindside: when speculative execution allows ASLR to be bypassed

Academics have developed a new technique to attack secure computer systems by abusing speculative execution, a processor mechanism that is…
Back to top button

Adblock Detected

Please consider supporting us by disabling your ad blocker