Image The U.S. confirms cyber actions in support of Ukraine
Cyber stability
07.18.22 Cyber stability
The U.S. confirms cyber actions in support of Ukraine
Read
01
MIN
Image Black Basta ransomware: an emerging threat
Cybercrime
07.18.22 Cybercrime
Black Basta ransomware: an emerging threat
Read
01
MIN
Image Cyberattacks: a month after declaring a state of emergency, what is the situation in Costa Rica?
Cyber stability
07.11.22 Cyber stability
Cyberattacks: a month after declaring a state of emergency, what is the situation in Costa Rica?
Read
06
MIN
Image The Rise of Mobile Malware
Cybercrime
07.04.22 Cybercrime
The Rise of Mobile Malware
Read
06
MIN
Image European cyber sovereignty: dream or reality?
Digital Sovereignty
European cyber sovereignty: dream or reality?
Read
06
MIN
Image [FIC 2022] A look back at the OSINT & Cyber Investigation Day
06.27.22
FIC 2022 A look back at the OSINT & Cyber Investigation Day
Read
07
MIN
Image Panorama of cyber innovation - 2022 FIC Startup Award
06.27.22
Panorama of cyber innovation – 2022 FIC Startup Award
Read
01
MIN
Image Privacy shield : is it really necessary to get out of the current ambiguity?
Digital Sovereignty
Privacy shield : is it really necessary to get out of the current ambiguity?
Read
03
MIN
Image How to monitor algorithms
Digital transformation
How to monitor algorithms
Read
08
MIN
Image Semiconductors: Spain invests €12.25 billion
06.14.22
Semiconductors: Spain invests €12.25 billion
Read
01
MIN
Image Cyber alliance between the U.S., Japan, India and Australia
Cyber stability
06.14.22 Cyber stability
Cyber alliance between the U.S., Japan, India and Australia
Read
02
MIN
Image "Unsophisticated" attacks account for 90% of crypto theft
Risks management
06.14.22 Risks management
“Unsophisticated” attacks account for 90% of crypto theft
Read
02
MIN
Image Anonymous declares war on Russian Killnet hackers
Cybercrime
06.14.22 Cybercrime
Anonymous declares war on Russian Killnet hackers
Read
01
MIN
Image How can we protect ourselves against network infrastructure sabotage?
Cybercrime
06.14.22 Cybercrime
How can we protect ourselves against network infrastructure sabotage?
Read
05
MIN
Image Securing the Metaverse: The Gulf’s Real-World Challenges for a Fictional Universe
Digital transformation
Securing the Metaverse: The Gulf’s Real-World Challenges for a Fictional Universe
Read
09
MIN
Image Competition: EU is investigating Apple Pay
06.01.22
Competition: EU is investigating Apple Pay
Read
01
MIN
Image Switzerland: The number of reported cyber incidents doubled in 2021
Cybercrime
06.01.22 Cybercrime
Switzerland: The number of reported cyber incidents doubled in 2021
Read
01
MIN
Image Microsoft details hundreds of Russian cyberattacks on Ukraine
Cyber stability
06.01.22 Cyber stability
Microsoft details hundreds of Russian cyberattacks on Ukraine
Read
01
MIN
Image U.S.: $12m for cybersecurity research in the energy sector
Industry and OT
06.01.22 Industry and OT
U.S.: $12m for cybersecurity research in the energy sector
Read
01
MIN
Image India: Cyberattacks target oil refineries
Industry and OT
06.01.22 Industry and OT
India: Cyberattacks target oil refineries
Read
01
MIN
Image Cybercrime in West Africa: towards a multi-state organisation?
Cybercrime
06.01.22 Cybercrime
Cybercrime in West Africa: towards a multi-state organisation?
Read
06
MIN