The Rise of Artificial Intelligence in Cyber Security

Currently, the new trends in cyber security are the use of artificial intelligence (AI) and machine-learning to predict threats before they are even conceived....

Web Apps: A Great Target For Cyber Criminals

Web Applications are everywhere, and are in most cases a core component for companies. They are used for various reasons and very often capture,...
Hacker

Effectively Securing Your Corporate Web Applications in 5 Steps

According to the latest Verizon Data Breach Investigations Report, cyber-attacks are on the rise. The cat-and-mouse game between hackers and defenders of corporate web...
wizlynx CTI - Dark Web

Dark Web – Use It At Your Own Advantage!

The Dark Web is a very mysterious place and very difficult to access…Nah - just kidding! Today’s media outlets are perhaps giving that impression,...
Turning Point

Turning Point – Is Your Company Safe?

In today’s world, more and more companies are relying on cheap security services, lured by the low prices offered to them. In parallel with...
wizlynx swiss Chines symposium

Swiss Chinese Career Symposium

wizlynx group is proud to announce its participation to the first Swiss Chinese Career Symposium that will take place at Launchlabs in Basel on...
Verizon DBIR 2016

Cyber-Threat: Just a buzz word or a real risk for your...

A sober reflection on the facts delivered by Verizon with their annual “2016 Data Breach Investigations Report (DBIR)” For the last few years, we read...
Ransomware illustration

Your Data Can Be Kidnapped Too… Ransomware in Action

According to Wikipedia “Ransom is the practice of holding a prisoner or item to extort money or property to secure their release, or it...
Banking Trojan Illustration

Banking Trojans – An Immortal Enemy

A few years ago, the best way for a criminal to prepare for retirement was to rob a bank by physically breaking in or...
- Advertisement -
Ethical Hacking and Penetration Testing