News

Do you know our Offensive Detection and Securit...
At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...
Do you know our Offensive Detection and Securit...
At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...

Do you know our Incident Response and Digital F...
At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...
Do you know our Incident Response and Digital F...
At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...

Do you know what the CIS Security Controls Matr...
Due to the proliferation of increasingly complex and sophisticated cyber threats , it is essential to have a robust framework to protect digital assets against possible cyber attacks and cyber...
Do you know what the CIS Security Controls Matr...
Due to the proliferation of increasingly complex and sophisticated cyber threats , it is essential to have a robust framework to protect digital assets against possible cyber attacks and cyber...

Explorando el Directorio Activo (AD): Bootcamp ...
El Directorio Activo (AD) es una pieza clave en la infraestructura de numerosas organizaciones, gestionando la autenticación, autorización y políticas de seguridad en entornos Windows. Debido a su ...
Explorando el Directorio Activo (AD): Bootcamp ...
El Directorio Activo (AD) es una pieza clave en la infraestructura de numerosas organizaciones, gestionando la autenticación, autorización y políticas de seguridad en entornos Windows. Debido a su ...

MITER y su framework MITER ATT&CK
Along the way, the daily and continuous work of the fight against cyber threats and in favor of a better level of cybersecurity , MITER , and its framework MITER...
MITER y su framework MITER ATT&CK
Along the way, the daily and continuous work of the fight against cyber threats and in favor of a better level of cybersecurity , MITER , and its framework MITER...

¿Tu web está en riesgo? Descubre por qué las li...
Vulnerable and Outdated Components Introducción Las aplicaciones web modernas siguen arquitecturas de múltiples componentes software como bases de datos, APIs (Application Programming Interface), b...
¿Tu web está en riesgo? Descubre por qué las li...
Vulnerable and Outdated Components Introducción Las aplicaciones web modernas siguen arquitecturas de múltiples componentes software como bases de datos, APIs (Application Programming Interface), b...