Image Two months later, the cyberattack on Asahi continues to disrupt the group’s operations
Cybersecurity
12.01.25 Cybersecurity
Two months later, the cyberattack on Asahi continues to disrupt the group’s operations
Read
01
MIN
Image AI-Powered Browsers Create New Vulnerabilities
Risks management
12.01.25 Risks management
AI-Powered Browsers Create New Vulnerabilities
Read
07
MIN
Image SBOM: From Regulatory Constraint to Cornerstone of Software Security
Cybersecurity
11.27.25 Cybersecurity
SBOM: From Regulatory Constraint to Cornerstone of Software Security
Read
07
MIN
Image Kimsuky: Pyongyang’s Eye in Seoul’s Mailbox
Cybercrime
11.25.25 Cybercrime
Kimsuky: Pyongyang’s Eye in Seoul’s Mailbox
Read
06
MIN
Image Negationist Statements by Grok on X: LDH and SOS Racisme File a Complaint
Digital transformation
Negationist Statements by Grok on X: LDH and SOS Racisme File a Complaint
Read
02
MIN
Image Europe Finally Strengthens Its Tech Response
Digital Sovereignty
Europe Finally Strengthens Its Tech Response
Read
02
MIN
Image Éric Singer, CISO at Ingenico, a craftsman of digital trust
Cybersecurity
11.21.25 Cybersecurity
Éric Singer, CISO at Ingenico, a craftsman of digital trust
Read
04
MIN
Image Shani Benoualid, Ambassador of the Trust & Safety Forum: “Europe has regulation, but not yet the ecosystem”
Cyber +
11.18.25 Cyber +
Shani Benoualid, Ambassador of the Trust & Safety Forum: “Europe has regulation, but not yet the ecosystem”
Read
07
MIN
Image A strategic committee to support the development of the Trust & Safety Forum 
Digital transformation
A strategic committee to support the development of the Trust & Safety Forum 
Read
02
MIN
Image Cloud Sovereignty: How Berlin and Paris Are Trying to Draw a European Line
Digital Sovereignty
Cloud Sovereignty: How Berlin and Paris Are Trying to Draw a European Line
Read
14
MIN
Image Cloud Sovereignty Framework: when the devil is in the details
Digital Sovereignty
Cloud Sovereignty Framework: when the devil is in the details
Read
04
MIN
Image Cyber Risk Quantification (CRQ): Deciphering Financial Exposure to Better Prioritize Cybersecurity Investments
Cybersecurity
11.12.25 Cybersecurity
Cyber Risk Quantification (CRQ): Deciphering Financial Exposure to Better Prioritize Cybersecurity Investments
Read
09
MIN
Image United Kingdom: the drinking water network targeted by five cyberattacks since early 2024
Industry and OT
11.10.25 Industry and OT
United Kingdom: the drinking water network targeted by five cyberattacks since early 2024
Read
01
MIN
Image United States: a “foreign actor” hacked the Congressional Budget Office
Cybersecurity
11.10.25 Cybersecurity
United States: a “foreign actor” hacked the Congressional Budget Office
Read
01
MIN
Image European police forces dismantle major credit card fraud network
Fraud
11.07.25 Fraud
European police forces dismantle major credit card fraud network
Read
01
MIN
Image Federal report questions Canada’s digital sovereignty
Digital Sovereignty
Federal report questions Canada’s digital sovereignty
Read
01
MIN
Image Pro-Russian group Curly COMrades used virtual machines to compromise systems
Cybercrime
11.07.25 Cybercrime
Pro-Russian group Curly COMrades used virtual machines to compromise systems
Read
01
MIN
Image 2026, a year of major cyber threats according to Google
Cybersecurity
11.07.25 Cybersecurity
2026, a year of major cyber threats according to Google
Read
01
MIN
Image The FIGs: An economic power serving U.S. tech?
Digital Sovereignty
The FIGs: An economic power serving U.S. tech?
Read
06
MIN
Image Regulating the Digital World, Protecting Youth: The Challenge of the Trust & Safety Forum 2026
Digital transformation
Regulating the Digital World, Protecting Youth: The Challenge of the Trust & Safety Forum 2026
Read
02
MIN
Image Cisco Talos warns about attacks from the Russian-speaking RaaS group Qilin
Cyber +
10.30.25 Cyber +
Cisco Talos warns about attacks from the Russian-speaking RaaS group Qilin
Read
01
MIN