News

Windows Defender vs. Rubeus: ¿Quién ganará?

Windows Defender vs. Rubeus: Who will win?

Celia Catalán

Introduction In the previous edition, we discussed how to evade Rubeus by understanding and analyzing the YARA rules that serve as the detection basis. However, this was not enough, as...

Windows Defender vs. Rubeus: Who will win?

Celia Catalán

Introduction In the previous edition, we discussed how to evade Rubeus by understanding and analyzing the YARA rules that serve as the detection basis. However, this was not enough, as...

Rubeus contra YARA: ¿Quién ganará? Descubre la clave de la evasión

Rubeus vs YARA: Who will win? Discover the key ...

Celia Catalán

Introduction In corporate environments, the execution of tools like Mimikatz, Rubeus, and other widely known binaries is often blocked due to the implementation of advanced measures ...

Rubeus vs YARA: Who will win? Discover the key ...

Celia Catalán

Introduction In corporate environments, the execution of tools like Mimikatz, Rubeus, and other widely known binaries is often blocked due to the implementation of advanced measures ...

Inteligencia Artificial: Avances e Impacto en la Ciberseguridad

Artificial Intelligence: Advances and Impact on...

JUAN ANTONIO CALLES

Artificial Intelligence (AI) has advanced significantly in recent years, transforming cybersecurity for both defense and attack. Thanks to advanced models like GPT-4 and machine learning algorithms, AI tools now allow...

Artificial Intelligence: Advances and Impact on...

JUAN ANTONIO CALLES

Artificial Intelligence (AI) has advanced significantly in recent years, transforming cybersecurity for both defense and attack. Thanks to advanced models like GPT-4 and machine learning algorithms, AI tools now allow...

NoSQL Injection (NoSQLi): Cómo funcionan y cómo defenderte

NoSQL Injection (NoSQLi): How They Work and How...

Celia Catalán

NoSQL Injections (NoSQLi) NoSQL databases are data storage systems designed to handle large volumes of unstructured (or semi-structured) information...

NoSQL Injection (NoSQLi): How They Work and How...

Celia Catalán

NoSQL Injections (NoSQLi) NoSQL databases are data storage systems designed to handle large volumes of unstructured (or semi-structured) information...

OWASP, el “mecanismo” de defensa contra las amenazas web

OWASP, the defense “mechanism” against web threats

Iñigo Ladrón Morales

All computer products and services of software and hardware have failures, inaccuracies, problems, bugs, security gaps or security holes, or vulnerabilities. Taking advantage of these flaws by performing exploitation of...

OWASP, the defense “mechanism” against web threats

Iñigo Ladrón Morales

All computer products and services of software and hardware have failures, inaccuracies, problems, bugs, security gaps or security holes, or vulnerabilities. Taking advantage of these flaws by performing exploitation of...

¿Conoces nuestros servicios de Protección, basados en NIST CSF?

Do you know our Protection services, based on N...

Iñigo Ladrón Morales

At Zerolynx we are specialists in professional services for companies in the field of cybersecurity. Specifically in corporate security, corporate cybersecurity, corporate intelligence, corporate cyberintelligence and patrimonial security. Our services...

Do you know our Protection services, based on N...

Iñigo Ladrón Morales

At Zerolynx we are specialists in professional services for companies in the field of cybersecurity. Specifically in corporate security, corporate cybersecurity, corporate intelligence, corporate cyberintelligence and patrimonial security. Our services...