The simplest attacks are often the most effective. In most companies, webmail access portals are exposed on the internet and do not always benefit from sufficient access-control mechanisms. In addition, some messaging services offer extended features that go beyond simple…
Category: Deep-dive
In our previous articles of this OT cybersecurity monitoring series (Cybersecurity monitoring for OT / Cybersecurity tooling strategy), we explained the current state of OT detection capabilities and discussed the right tooling strategy. This third article focuses on a key question: how do you measure the efficiency of…
Detection within industrial environment In a previous article: Cybersecurity monitoring for OT, Current situation & perspectives we have seen that OT, while overall less impacted than IT, is not exempt from cyberthreats & not immune to cyberattacks. But, due to…
Overview and recommendations The luxury market continues to grow globally and is expected to reach €2.5 trillion by 2030[1]. The health of this sector is therefore having an increasingly significant impact on the economy. This is especially true…
“Smart homes”, “Smart devices” and even “Smart cities”: these now familiar expressions illustrate how deeply embedded the Internet of Things (IoT) is in our daily lives. At the heart of these technologies, the MQTT protocol plays a subtle yet essential role.…
Over the past decade, cloud infrastructure such as Amazon Web Services (AWS), has been increasingly used to host critical infrastructure, manage sensitive data, and ensure global scalability. The shift to hybrid and cloud-native architecture has deeply transformed how infrastructure is…
The UK insurance and reinsurance industry is navigating a period of rapid transformation, marked by regulatory reform, accelerating cyber threats, and shifting macroeconomic conditions. With a combined market valuation of £74.6 billion and forecasted earnings growth of 18% annually, the…
AI at the service of cybersecurity: a concrete step forward Every year since 2020, Wavestone has identified Swiss cybersecurity startups in its eponymous radar. While AI has established itself as a cross-disciplinary subject in all fields, the 2025 Radar…
What if your most sensitive data became accessible in an instant? The growing excitement about the advent of quantum computers is justified for a subject that is no longer science fiction but involves a new kind of threat. Indeed, according…
For the last few weeks, I have been developing a full custom Command and Control (C2). This C2 uses several Windows DLL for network communication and specially the WINHTTP.DLL one to handle HTTP requests used for the HTTP and HTTPS…
