Skip to content
HUCENCY
Human-Centered Cybersecurity
HUCENCYHUCENCY
  • Solutions
    • Menu iconMeet Thomas,
      your virtual CISO
      Raise awareness, anticipate, manage... Tailor my skills to your specific challenges.
    • Menu iconRaise awareness of threatsFrequent cyberattacks such as phishing and vishing target your teams. We help them recognize these threats and protect your organization.
    • Menu iconAnticipate mistakesA weak password or a poorly shared document... Mistakes happen. With Thomas, your employees receive advice and support.
    • Menu iconManage your cybersecurityCIOs and CISOs, use a platform: dashboards, reports, dark web monitoring, etc. Manage cybersecurity with clear data.
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT
Request a demo
  • Solutions
    • Menu iconMy name is Thomas,
      your virtual CISO.
    • Menu iconRaise awareness of threats
    • Menu iconAnticipate errors
    • Menu iconTake control of your cybersecurity
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT

Category Archives: Cyberattacks

You are here:
  1. Home
  2. Category: "Cyberattacks"

Cryptocurrency scams

Cryptocurrency scams

Web News, Before You Click, Cryptocurrency, CyberattacksBy Steph76February 1, 2022

What is cryptocurrency? The AMF, ACPR, and DGCCRF recently issued a warning about the rise in cryptocurrency scams. 600% of cryptocurrency losses were due to theft and fraud between 2020 and 2021. A cryptocurrency is a virtual currency that operates independently of banks and governments. It…

Sacreware

Are you familiar with scareware?

Before You Click, Cyberattacks, PhishingBy Steph76January 20, 2022

What is a scareware attack? Have you ever received a notification warning you that your computer has been infected with a virus? This is a classic scareware technique. As the name suggests, a scareware attack frightens users by making them believe their computer is infected with a virus. It lures them into…

Reporting incidents: a difficult task

Reporting incidents: a difficult task.

Before Clicking, Cyberattacks, Security RecommendationsBy Steph76July 13, 2021

Internet users prefer to sweep their mistakes under the mouse mat rather than report an incident. A Fujitsu study shows that users are even more reluctant to report IT incidents when they occur at work. This study, entitled "Building a Cyber Smart Culture," explains...

Colonial Pipeline cyberattack in the USA

Cyberattack hits Colonial Pipeline in the US

News on the web, Before you click, Cyberattacks, Cyberattacks on businesses, RansomwareBy Steph76June 3, 2021

The facts One of the largest fuel pipelines in the United States, Colonial Pipeline, which connects gas stations, refineries, and airports in the eastern United States, recently suffered a large-scale cyberattack. The attack The company was forced to shut down all its systems following this digital attack. It says it has hired a team...

QR codes and cyberattacks: what are the risks?

QR codes and cyberattacks: what are the risks?

Before Clicking, Cyberattacks, Security RecommendationsBy Steph76May 18, 2021

What is a QR code? A QR code (Quick Response code) is a two-dimensional barcode. It links to a web page or other content that is normally optimized for mobile and tablet access. The QR code consists of modules, usually black, arranged in a square with a white background. It was invented in 1994...

←1
23
…45678…
9101112131415
16→
Go to top

Map your organization's vulnerability level now with our phishing and vishing tests.

Request a Phishing Pentest

Request a Vishing Pentest