In a previous article, we talked about Petam.io, the automatic online scanner we have developed to detect security breaches as a tool to democratize cybersecurity.
              Democratization of cyber attacks
              
                
                   
                
                
                  
                    
                      
                    
                    
              
            
          
Democratization of cyber attacks
Jun 18, 2024 7:56:02 AM
  
  
  3
 min read
              Problems with the computer that may indicate a cyber attack
              
                
                   
                
                
                  
                    
                      
                    
                    
              
            
          
Problems with the computer that may indicate a cyber attack
Jun 18, 2024 7:54:19 AM
  
  
  2
 min read
              Managed Detection Response (MDR): ¿What is it and why is it worthy?
              
                
                   
                
                
                  
                    
                      
                    
                    
              
            
          
Managed Detection Response (MDR): ¿What is it and why is it worthy?
Jun 10, 2024 2:11:02 PM
  
  
  3
 min read
              Latest trends in cyberattacks
              
                
                   
                
                
                  
                    
                      
                    
                    
              
            
          
Latest trends in cyberattacks
Jun 10, 2024 2:08:56 PM
  
  
  2
 min read
              Black Basta Ransomware
              
                
                   
                
                
                  
                    
                      
                    
                    
              
            
          
Black Basta Ransomware
Jun 7, 2024 1:32:44 PM
  
  
  2
 min read
              Cybersecurity in the supply chain: Direct attacks
              
                
                   
                
                
                  
                    
                      
                    
                    
              
            
          
Cybersecurity in the supply chain: Direct attacks
May 24, 2024 12:55:51 PM
  
  
  3
 min read
              Industrial Cybersecurity: Concept and how to implement it
              
                
                   
                
                
                  
                    
                      
                    
                    
              
            
          
Industrial Cybersecurity: Concept and how to implement it
May 24, 2024 12:51:03 PM
  
  
  5
 min read
              Cybersecurity in the educational sector
              
                
                   
                
                
                  
                    
                      
                    
                    
              
            
          
Cybersecurity in the educational sector
May 17, 2024 12:49:55 PM
  
  
  3
 min read
              The importance of cybersecurity in your website for the SEO
              
                
                   
                
                
                  
                    
                      
                    
                    
              
            
          
The importance of cybersecurity in your website for the SEO
May 17, 2024 11:19:13 AM
  
  
  2
 min read
              Examples of cyberattacks launched with Artificial Intelligence
              
                
                   
                
                
                  
                    
                      
                    
                    
              
            
          
Examples of cyberattacks launched with Artificial Intelligence
May 17, 2024 11:17:49 AM
  
  
  3
 min read
              How to recover files encrypted by ransomware
              
                
                   
                
                
                  
                    
                      
                    
                    
              
            
          
How to recover files encrypted by ransomware
May 13, 2024 1:56:46 PM
  
  
  2
 min read
              The 15 most common hacking techniques
              
                
                   
                
                
                  
                    
                      
                    
                    
              
            
          
The 15 most common hacking techniques
Mar 21, 2024 1:00:03 PM
  
  
  4
 min read



.png?width=133&height=86&name=1%20(1).png) 
                     
                    .png) 
               
              
             
            .png) 
           
        .png?width=262&height=150&name=accio-10-negre%20(1).png) 
     
    