News
News
How can we spot a deepfake?
Artificial intelligence and deep learning technologies now make it possible to create content from scratch, featuring real people with a very high degree of realism. And with these so-called deepfakes, new risks are emerging. How can you guarantee the authenticity of an image or video? How can you tell the difference between what’s real and what’s not? What can be done to combat the spread of counterfeit content? For several years, POST Luxembourg – in partnership with the University of Luxembourg – has been working on these issues, and they’re more prevalent than ever.
Read this article
Author
Cu NguyenPublished on
30 January 2024
Preventing DDoS attacks by blocking illegitimate traffic
The number of so-called Denial of Service (DDoS) attacks in Luxembourg is increasing month after month. Cybercriminals are hijacking connected devices to send illegitimate traffic to organisations and saturate connections. These attacks have the effect of degrading the level of service or paralysing the business. To help Luxembourg businesses protect themselves against these attacks, POST has solutions for blocking illegitimate traffic (in real time if needed) before it reaches the organisation's systems.
Read this article
Author
Paul FelixPublished on
19 December 2023
Cyberscore: the Security Rating for SMEs in Luxembourg
A Cyberscore is an initiative developed by POST and Luxcontrol to help small and medium-sized companies in Luxembourg tackle cybersecurity issues more easily.
Read this article
Author
Marion CuisinierPublished on
24 October 2023
October, European Cybersecurity Month.
To inaugurate European Cybersecurity Month, ENISA (the European cybersecurity agency) published an article in September 2023 highlighting the risks of increased phishing linked to new technologies that are likely to grow between now and 2030.
Read this articleAuthor
Fanny NganPublished on
17 October 2023
20,000 phishing SMS posing as Guichet.lu detected in one week
In recent weeks, an extensive SMS phishing campaign has targeted Luxembourg mobile numbers, pretending to be the Public Administration citizens’ portal.
Read this article
Author
Cu NguyenPublished on
19 January 2023
Dealing with increasingly frequent DDoS attacks
When targeted by volumetric attacks, Luxembourg organisations can quickly find themselves paralysed, and literally cut off from the internet
Read this article
Author
Paul FelixPublished on
29 November 2022
The POST CyberForce big interview
“The most striking event of 2021 was undoubtedly the reporting and malicious exploitation of the log4j vulnerability.”
Read this article
Author
Marion CuisinierPublished on
19 July 2022
Simulate attacks on telecom networks to better protect them
Telecoms networks are the target of increasingly frequent attacks by malicious actors seeking to hijack them or intercept communications.
Read this article
Author
Alexandre De OliveiraPublished on
19 April 2022
Preventing risky connections with DNS protection
Faced with a variety of cyber threats, organisations now have an opportunity to strengthen their security with a DNS protection solution and ensure the legitimacy of business-related traffic.
Read this articleAuthor
Béatrice SeiwertPublished on
22 March 2022
Securing endpoints in the age of remote working
How can organisations protect against threats when the IT environment is more open, employees are working remotely, and there is a greater range of employee devices (workstation, mobile or tablet) in play?
Read this article
Author
PitPublished on
18 October 2021
Making room for women in cybersecurity
To mark International Women’s Day, we’re offering you an opportunity to meet Aurélie Da Silva, Information Security Officer at POST Luxembourg.
Read this article
Author
PitPublished on
08 March 2021
The human factor is a key to cybersecurity strategy
Companies need to protect their information, whether physical or digital. Moreover, threats do not come from outside the company alone. Internal threats are all too real, and all too often overlooked.
Read this article
Author
PitPublished on
15 July 2020
Contact us
Do you have any questions about an article? Do you need help solving your IT issues?
Contact an expert







Our experts answer your questions
Do you have any questions about an article? Do you need help solving your IT issues?