Blog

By albert, In Blog Posted 19 Sep 2019

Your iPhone is (in)secure

iPhone is considered the most unhackable smartphone, especially thanks to the fact that it is a closed OS so nobody…

Leer más
By albert, In Blog Posted 3 Sep 2019

Don’t feed the Phish!

As you all should know nowadays, a phishing attack is a fraudulent attempt to obtain sensitive information such as usernames,…

Leer más
By albert, In Blog Posted 1 Ago 2019

Steganography and Cyberattacks

What is steganography? It consists in concealing a message within another message. It is a combination of two Greek words:…

Leer más
By albert, In Blog Posted 22 Jul 2019

How to use Responder to capture NetNTLM and grab a shell

Responder is a tool with different capabilities but the most interesting is the possibility of setting up a rogue samba…

Leer más
By albert, In Blog Posted 13 Jun 2019

The state of AI in cyber security

With so much hype over these last years in Artificial Intelligence, it makes us wonder whether AI is already prepared…

Leer más
By albert, In Blog Posted 4 Jun 2019

Awareness is life

Did you know that most of cybersecurity breaches are due to human error? Social engineering is a current favourite tactic…

Leer más
By albert, In Blog Posted 9 May 2019

Identity and Access Management

The identity life cycle in a company context is a term used to define the complete cycle of the identification…

Leer más
By albert, In Blog Posted 7 May 2019

Forseti Security for Google Cloud Platform (GCP)

Metallica sang in “…And Justice for All”: “Hammer of justice crushes you overpower”, so who’s better to judge us than…

Leer más
By albert, In Blog Posted 30 Abr 2019

"Los CEOs en USA califican a la seguridad cibernética como su principal preocupación externa para 2019"

Estos días se puede leer sobre el pronóstico de la economía, y no hay nadie realmente optimista. La guerra comercial…

Leer más
By albert, In Blog Posted 27 Mar 2019

OWASP Guide: Part 3

In this post we are going to finish with the guide that we started a few days ago about OWASP….

Leer más
1 2 3