Blog
Your iPhone is (in)secure
iPhone is considered the most unhackable smartphone, especially thanks to the fact that it is a closed OS so nobody…
Don’t feed the Phish!
As you all should know nowadays, a phishing attack is a fraudulent attempt to obtain sensitive information such as usernames,…
Steganography and Cyberattacks
What is steganography? It consists in concealing a message within another message. It is a combination of two Greek words:…
How to use Responder to capture NetNTLM and grab a shell
Responder is a tool with different capabilities but the most interesting is the possibility of setting up a rogue samba…
The state of AI in cyber security
With so much hype over these last years in Artificial Intelligence, it makes us wonder whether AI is already prepared…
Awareness is life
Did you know that most of cybersecurity breaches are due to human error? Social engineering is a current favourite tactic…
Identity and Access Management
The identity life cycle in a company context is a term used to define the complete cycle of the identification…
Forseti Security for Google Cloud Platform (GCP)
Metallica sang in “…And Justice for All”: “Hammer of justice crushes you overpower”, so who’s better to judge us than…