
Credential stuffing (2)
The first part of this report highlighted an often underestimated reality: credential stuffing does not rely on spectacular technical flaws, but on the reutilization of

The first part of this report highlighted an often underestimated reality: credential stuffing does not rely on spectacular technical flaws, but on the reutilization of

When a data breach is revealed, it is generally treated as a one-off event. When a database is compromised, an official statement and recommendations are

The question of whether 2025 marked a decline in digital piracy, as suggested by some institutional reports, or if we are witnessing a profound restructuring

The winter reminds us of a somewhat forgotten reality: the continuity of electricity, heating, gas, or services operated by critical infrastructure is never guaranteed. In

Energy has become one of the most sensitive areas of contemporary geopolitical rivalry. As states fight increasingly in the digital sphere, energy infrastructure represents a

A multi-layered approach combining secure design, cryptographic protections, best operational practices and a regulatory framework is required to protect biometric data. Therefore, protecting biometric data

Biometrics—automatic recognition of fingerprints, irises, faces, voices, palm prints, behavioral signatures, etc.—have become a pillar of authentication in our digital and physical lives. The promise

In the first part of this article, we traced the origins, objectives, and main features of European Cybersecurity Month. We saw that it is an

Every year, October is dedicated to European Cybersecurity Month, a crucial event for digital protection. Coordinated by the European Union Agency for Cybersecurity (ENISA) and

As the new school year begins, digital fatigue is spreading across organizations. Too many alerts, too many tools, and too many messages. Ultimately, no one