Posts by tag
What happens when a cyberattack affects a basic service? According to a report, one third of critical infrastructures have been attacked at some point.
There are several risks related to the BGP, NTP and FTP protocols, that can be used by cybercriminals as attack vectors and can pose real threats.
Enrique Ávila: “Cybersecurity isn’t negotiable: the loss of resources can mean the end of your company”
Enrique Ávila is the director of the Spanish National Center for Excellence in Cybersecurity (CNEC), a key cybersecurity organization.
Here we explain three types of incidents in which cybercriminals make use of ransomware: cybertheft, extortion, and sabotage of facilities.
90% of companies still need to implement, increase or improve their IT security processes in order to become more cyber-resilient.
The new trend of stealing cryptocurrencies shows no signs of letting up. In the first 9 months of 2018, 854 million dollars’ worth has already been stolen.