
ChatGPT Atlas vulnerability: new attack in AI-based browsers
Written by: Robin Kiss, CPTS, EMAPT, BSCP ChatGPT Atlas vulnerability: a new attack surface in AI-based browsers AI is increasingly becoming part of browsers. Ability to read, interpret

Written by: Robin Kiss, CPTS, EMAPT, BSCP ChatGPT Atlas vulnerability: a new attack surface in AI-based browsers AI is increasingly becoming part of browsers. Ability to read, interpret

Phishing can cause billions in financial damage - how to spot it! Phishing has become one of the most dangerous threats in recent years, affecting individuals and

Using ChatGPT: A Complete Guide to the Practical Application of Artificial Intelligence The use of ChatGPT is becoming more and more widespread today, as artificial intelligence has fundamentally reshaped the way
Written by: Fanni Leila Varga, CAPM What project management skills and knowledge are required for novice project managers? What are the skills and competencies that project managers need to be a project manager?

The meaning of phishing: What is phishing and how to defend against it? The number of phishing attacks has increased dramatically in recent years and is now one of the world's leading forms of phishing.

What malware is, what it is and how to remove it Malware is one of the biggest cybersecurity threats today. Whether viruses, Trojans, spyware or ransomware,

How does detection work in cybercrime and how can we defend against it? Before a cyber attack, hackers often spend weeks gathering information about their target. This hidden, preparatory

Extortionist viruses in the digital world: what is ransomware and how to defend against it? Ransomware is one of the most dangerous forms of cybercrime. One wrong click or missed update

The meaning of cyber attack: what types are there and how can we defend against them? As digitalisation evolves, the threats in cyberspace are becoming more sophisticated and targeted. The sophistication and sophistication of cyber-attacks are becoming more sophisticated and sophisticated.

The meaning of social engineering in the world of cyber attacks In the world of cyber security, the focus is often on technical protection: firewalls, antivirus, encryption and strong passwords. But there are

Scrum Guide Expansion Pack: why is it essential literature for organisations? The Scrum Guide Expansion Pack is not just a new document, it is a niche, free resource,

White hat hackers: who are the mysterious white hats? With the rapid evolution of the digital world, the issue of information security is becoming increasingly important. Although the word "hacker"
To provide you with the best user experience, we and our partners use technologies such as cookies to store and/or access device information. We do this to improve your browsing experience and to display (non) personalised ads. Consenting to these technologies allows us to process data such as browsing behaviour or unique identifiers on this website. Refusal or withdrawal of consent may adversely affect certain features and services.
Click on the button below to agree to the above or to make more detailed decisions. Your choice only applies to this page. You can change your preferences at any time, including withdrawing your consent, by using the switches in the cookie policy or by clicking on the Manage consent button at the bottom of the screen.

Our office will be closed from 17.12.2024 to 06.01.2025, so it may take longer than usual to confirm training applications and respond to enquiries during this period. Thank you for your understanding!