Most read categories

NIS2

NIS2

7 posts
Cybersecurity

Cybersecurity

30 posts
AI & ML

AI & ML

4 posts
Educational

Educational

47 posts
Cybersecurity ECS Educational General

How to convince Top Management to invest in cybersecurity and secure software development

I’ve heard many times IT people and Software Developers complaining that they have difficulties to sensibilize their managers to invest more in cybersecurity. Also some employees of my customers in the cybersecurity consulting area show sometimes frustration when we are talking about priorities of their top management – cybersecurity is almost neveve one until it […]

Article Cybersecurity ECS General Security

The Importance of Training Employees in Cybersecurity

In today’s increasingly interconnected world, cyber threats pose a significant risk to businesses of all sizes. As technology advances, cybercriminals become more sophisticated, making it imperative for organizations to prioritize cybersecurity measures. While investing in robust infrastructure and advanced tools is crucial, one often overlooked aspect is the training of employees. This article aims to […]

Antivirus Cybersecurity ECS General News

Preventing Attacks and Securing the Supply Chain in the Security Software Industry

The security software industry plays a vital role in safeguarding sensitive data and protecting digital infrastructure. However, the industry itself faces a significant threat from supply chain attacks. Supply chain attacks occur when cybercriminals target vulnerabilities within the supply chain to compromise software or hardware products before they reach the end-users. By infiltrating the supply […]

Antivirus Article Cybersecurity ECS Educational improve-your-security Security

Securing the Secure: The Importance of Secure Software Practices in Security Software Development

In an increasingly interconnected digital world, the importance of secure software cannot be overstated. Many people think that by using security software all their digital assets become automatically secured. However, it is crucial to recognize that security software itself is not inherently secure by default. To ensure the highest level of protection, security software must […]

Article Automotive Cybersecurity ECS General

The Automotive industry’s inadequate approach towards software (in the cars)

Introduction The automotive industry has witnessed a paradigm shift with the increasing integration of software in vehicles. Modern cars are no longer just mechanical devices with a motor, wheels and steering; they are now sophisticated machines having dozens of CPUs (called ECU), entire computers, high speed network to connect them (called CAN-bus) and relying on […]

News Phishing

Targeted Phishing: Your auth password for [ user@host.com ] expires today !

It’s been a while since I received a targeted phishing. This time it is on one of my email accounts hosted on Google, and strangely, their phishing filter did not catch this one.     ITNotification <ITNotices@mail.com>  sorin@mustaca.com Expiration Your Password for sorin@mustaca.com has expired today. You can change your Password or continue using current Access   KEEP PASSWORD  ->erased domain on geocities.com   sorin@mustaca.com Admin. 2023 […]

ChatGPT

ChatGPT and copywriting

I received a spam and the guy offered to have my corporate site re-written. He sent me an example of how it be like in a Google Docs document. The text was very artificial, kind of those written by ChatGPT (check my recent blog posts about this: www.sorinmustaca.com). I will write about this too. Original: We […]