by Alexander | 3 March 2025
CISA (Cybersecurity and Infrastructure Security Agency) is a US government agency attached to the Department of Homeland Security (DHS).
Created in 2018, its main mission is to protect the United States' critical infrastructures and strengthen national cybersecurity in the face of cyber and physical threats.
by Alexander | 28 October 2024
Cookies are small text files stored on a user's device when they visit a website.
They contain information about the user's preferences, browsing history and other data enabling the online experience to be personalised.
by Alexander | 28 February 2025
Cryptojacking, also known as cryptographic hacking, is an insidious and increasingly widespread form of cyberattack. It involves cybercriminals secretly exploiting the computer resources (CPU, GPU graphics card, RAM, bandwidth, and consequently electrical energy) of victims, without their consent or knowledge, to generate cryptocurrencies (such as Bitcoin, Monero, Ethereum, or other digital currencies).
by Alexander | 31 October 2024
In cybersecurity, CSP (Content Security Policy) is a technique for improving website security.
This is a web security mechanism that allows website administrators to specify which content sources are allowed to be loaded by the browser. It aims to prevent a wide range of attacks, including cross-site scripting (XSS), data injection and malicious script execution.
by Alexander | 2 March 2025
A CSRF (or Cross-Site Request Forgery) attack is a malicious technique in which an attacker encourages a user to perform unwanted actions on a web application to which they are already authenticated, without their knowledge. The aim is to divert the trust that the application places in the user, by exploiting session cookies or identifiers stored in the browser.