top of page

Blog


ARTIFICIAL INTELLIGENCE ATTACKS AND PROTECTION METHODS
The aim of cyber attacks using artificial intelligence is usually to damage a target system or weaken the security of that system. For example, a cyber attacker can use artificial intelligence to access a company's database, steal and change this data, or disrupt the functionality of the system he accesses and make it unusable. WHAT IS ZERO TRUST? In the Zero Trust method, it is assumed that all objects in a system (especially the objects with which these objects communicat
23 Oca 2024


Medusa Ransomware on the Rise
Threat actors associated with Medusa ransomware have stepped up their activities following the launch of a dedicated data leak site on the dark web in February 2023 to publish sensitive data of victims unwilling to accept their demands. "As part of their multi-extortion strategy, this group will provide victims with multiple options when their data is posted on their leak site, such as time extension, data deletion or download of all the data," Palo Alto Networks Unit 42 re
16 Oca 2024


Orange Networks Cyberattacks
Spain's second-largest telecom provider, Orange, faced a cyber attack on Wednesday that affected internet access for an unknown number of...
9 Oca 2024
bottom of page