News

Windows Defender vs. Rubeus: Who will win?
Introduction In the previous edition, we discussed how to evade Rubeus by understanding and analyzing the YARA rules that serve as the detection basis. However, this was not enough, as...
Windows Defender vs. Rubeus: Who will win?
Introduction In the previous edition, we discussed how to evade Rubeus by understanding and analyzing the YARA rules that serve as the detection basis. However, this was not enough, as...

Rubeus vs YARA: Who will win? Discover the key ...
Introduction In corporate environments, the execution of tools like Mimikatz, Rubeus, and other widely known binaries is often blocked due to the implementation of advanced measures ...
Rubeus vs YARA: Who will win? Discover the key ...
Introduction In corporate environments, the execution of tools like Mimikatz, Rubeus, and other widely known binaries is often blocked due to the implementation of advanced measures ...

Artificial Intelligence: Advances and Impact on...
Artificial Intelligence (AI) has advanced significantly in recent years, transforming cybersecurity for both defense and attack. Thanks to advanced models like GPT-4 and machine learning algorithms, AI tools now allow...
Artificial Intelligence: Advances and Impact on...
Artificial Intelligence (AI) has advanced significantly in recent years, transforming cybersecurity for both defense and attack. Thanks to advanced models like GPT-4 and machine learning algorithms, AI tools now allow...

NoSQL Injection (NoSQLi): How They Work and How...
NoSQL Injections (NoSQLi) NoSQL databases are data storage systems designed to handle large volumes of unstructured (or semi-structured) information...
NoSQL Injection (NoSQLi): How They Work and How...
NoSQL Injections (NoSQLi) NoSQL databases are data storage systems designed to handle large volumes of unstructured (or semi-structured) information...

OWASP, the defense “mechanism” against web threats
All computer products and services of software and hardware have failures, inaccuracies, problems, bugs, security gaps or security holes, or vulnerabilities. Taking advantage of these flaws by performing exploitation of...
OWASP, the defense “mechanism” against web threats
All computer products and services of software and hardware have failures, inaccuracies, problems, bugs, security gaps or security holes, or vulnerabilities. Taking advantage of these flaws by performing exploitation of...

Do you know our Protection services, based on N...
At Zerolynx we are specialists in professional services for companies in the field of cybersecurity. Specifically in corporate security, corporate cybersecurity, corporate intelligence, corporate cyberintelligence and patrimonial security. Our services...
Do you know our Protection services, based on N...
At Zerolynx we are specialists in professional services for companies in the field of cybersecurity. Specifically in corporate security, corporate cybersecurity, corporate intelligence, corporate cyberintelligence and patrimonial security. Our services...