Skip to content
HUCENCY
Human-Centered Cybersecurity
HUCENCYHUCENCY
  • Solutions
    • Menu iconMeet Thomas,
      your virtual CISO
      Raise awareness, anticipate, manage... Tailor my skills to your specific challenges.
    • Menu iconRaise awareness of threatsFrequent cyberattacks such as phishing and vishing target your teams. We help them recognize these threats and protect your organization.
    • Menu iconAnticipate mistakesA weak password or a poorly shared document... Mistakes happen. With Thomas, your employees receive advice and support.
    • Menu iconManage your cybersecurityCIOs and CISOs, use a platform: dashboards, reports, dark web monitoring, etc. Manage cybersecurity with clear data.
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT
Request a demo
  • Solutions
    • Menu iconMy name is Thomas,
      your virtual CISO.
    • Menu iconRaise awareness of threats
    • Menu iconAnticipate errors
    • Menu iconTake control of your cybersecurity
  • About
  • Partnership
  • Blog
  • Contact
  • EN
    • FR
    • ES
    • DE
    • PT
    • IT

Tag Archives: cyberattack

You are here:
  1. Home
  2. Articles tagged "cyberattack"

domain names

Artificial Intelligence and Cyberattacks

News on the web, Before you click, CyberattacksBy Steph76September 25, 2024

The rapid advancement of artificial intelligence (AI) has transformed many aspects of our daily and professional lives. While this technology offers enormous benefits, it also presents new challenges, particularly in the field of cybersecurity. One of the most concerning threats is the growing use of AI in cyberattacks, particularly…

NIS2 Directive: a small step for mankind, a giant leap for cybersecurity

Web News, Before You Click, Cyberattacks, RansomwareBy Steph76August 20, 2024

Cybersecurity risks are on the rise (phishing remains the most widespread threat: with approximately 562.4 million phishing emails recorded), making it necessary to strengthen security standards. Within organizations, security must be strengthened both technically and organizationally. In…

Bank scam

Cyber scams: a growing threat to organizations

News on the web, Before you click, CyberattacksBy Steph76July 30, 2024

In an increasingly digital world, organizations face a constant threat: cyber scams. These attacks, which are becoming increasingly sophisticated, aim to steal sensitive data, cripple IT systems, or extort money. The banking sector, which is particularly attractive to cybercriminals, is…

What is deepfake?

What is deepfake?

News on the web, Before you click, CyberattacksBy Steph76April 20, 2024

A deepfake, a portmanteau of “deep learning” and “fake,” is falsified content that uses artificial intelligence and machine learning. It involves superimposing a face or voice onto existing content. Very often, deepfakes are used to create videos or images that show people doing or saying things they never actually…

Two-factor authentication-2FA-Two-step authentication

What is 2FA? How can you better protect yourself?

Before You Click, Cyberattacks, PhishingBy Steph76March 15, 2024

Definition: Two-factor authentication (2FA) 2FA, also known as multi-factor authentication, is a security process in which the user provides two forms of identification from distinct categories of data. First factor: typically in the form of a physical token, such as the information on your credit card. Second factor…

←12345…
67891011
12→
Go to top

Map your organization's vulnerability level now with our phishing and vishing tests.

Request a Phishing Pentest

Request a Vishing Pentest