Skip to content
HUCENCY
Human-Centered Cybersecurity
HUCENCYHUCENCY
  • Solutions
    • Menu iconMeet Thomas,
      your virtual CISO
      Raise awareness, anticipate, manage... Tailor my skills to your specific challenges.
    • Menu iconRaise awareness of threatsFrequent cyberattacks such as phishing and vishing target your teams. We help them recognize these threats and protect your organization.
    • Menu iconAnticipate mistakesA weak password or a poorly shared document... Mistakes happen. With Thomas, your employees receive advice and support.
    • Menu iconManage your cybersecurityCIOs and CISOs, use a platform: dashboards, reports, dark web monitoring, etc. Manage cybersecurity with clear data.
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT
Request a demo
  • Solutions
    • Menu iconMy name is Thomas,
      your virtual CISO.
    • Menu iconRaise awareness of threats
    • Menu iconAnticipate errors
    • Menu iconTake control of your cybersecurity
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT

Category Archives: Cyberattacks

You are here:
  1. Home
  2. Category: "Cyberattacks"

What is deepfake?

What is deepfake?

News on the web, Before you click, CyberattacksBy Steph76April 20, 2024

A deepfake, a portmanteau of “deep learning” and “fake,” is falsified content that uses artificial intelligence and machine learning. It involves superimposing a face or voice onto existing content. Very often, deepfakes are used to create videos or images that show people doing or saying things they never actually…

Two-factor authentication-2FA-Two-step authentication

What is 2FA? How can you better protect yourself?

Before You Click, Cyberattacks, PhishingBy Steph76March 15, 2024

Definition: Two-factor authentication (2FA) 2FA, also known as multi-factor authentication, is a security process in which the user provides two forms of identification from distinct categories of data. First factor: typically in the form of a physical token, such as the information on your credit card. Second factor…

QR code phishing, QR code attack => QRishing

Have you heard of QRishing?

Web News, Before You Click, Cyberattacks, RansomwareBy Steph76October 9, 2023

What is QRishing? QRishing works on the same principle as traditional phishing: tricking victims into visiting malicious websites. However, instead of using hyperlinks, cyberattackers use QR codes. These codes can be printed and placed in public areas, sent by mail, or…

Why use the Phishing Alert Button?

News on the web, Before Clicking, Phishing Alert Button, CyberattacksBy Steph76April 26, 2023

What is the Phishing Alert Button?! The Phishing Alert Button, or PAB, is a tool that allows you to report potentially malicious emails, also known as phishing emails. It is a standalone real-time cyber risk management device that plays an essential role in reporting, ...

When hackers play Cupid

When hackers strike right at your heart!

News on the web, Before you click, CyberattacksBy Steph76February 13, 2023

What does cybersecurity have to do with Valentine’s Day?! Valentine’s Day is synonymous with love and celebrates the beauty of human relationships. Unfortunately, this also means that online scammers can take advantage of this time of emotional vulnerability to launch spear-phishing attacks using social engineering—and even…

←123456…
789101112131415
16→
Go to top

Map your organization's vulnerability level now with our phishing and vishing tests.

Request a Phishing Pentest

Request a Vishing Pentest