News
Cybersecurity in Authentication processes: Risk...
Authentication systems, such as logins, are a constant target of cyberattacks that seek to violate user security and access sensitive information. From techniques such as brute force, phishing and credential...
Cybersecurity in Authentication processes: Risk...
Authentication systems, such as logins, are a constant target of cyberattacks that seek to violate user security and access sensitive information. From techniques such as brute force, phishing and credential...
Flu Project unveils a new look!
This December Flu Project will turn 14 years old and we wanted to take advantage of this milestone to show off a new visual appearance, more adapted to the new...
Flu Project unveils a new look!
This December Flu Project will turn 14 years old and we wanted to take advantage of this milestone to show off a new visual appearance, more adapted to the new...
A10:2021 – Server-Side Request Forgery (SSRF)
Description The 'Server-Side Request Forgery' (SSRF) attack is a type of attack in which an attacker abuses the functionality of a server to make HTTP requests to internal resources or...
A10:2021 – Server-Side Request Forgery (SSRF)
Description The 'Server-Side Request Forgery' (SSRF) attack is a type of attack in which an attacker abuses the functionality of a server to make HTTP requests to internal resources or...
Zerolynx: reference in TLPT Tests - Red Team fo...
The DORA (Digital Operational Resilience Act) regulation, adopted by the European Union, establishes a regulatory framework to strengthen the digital operational resilience of financial entities,...
Zerolynx: reference in TLPT Tests - Red Team fo...
The DORA (Digital Operational Resilience Act) regulation, adopted by the European Union, establishes a regulatory framework to strengthen the digital operational resilience of financial entities,...
The ISO 27000 series: Beyond ISO 27001 and 27002
The ISO 27000 series is key to information security management, covering much more than the well-known ISO 27001. Standards such as ISO 27017 and 27018 strengthen security and privacy in...
The ISO 27000 series: Beyond ISO 27001 and 27002
The ISO 27000 series is key to information security management, covering much more than the well-known ISO 27001. Standards such as ISO 27017 and 27018 strengthen security and privacy in...
A05:2021 – Security misconfiguration
Introduction Vulnerability Description As a continuation of this series of posts on the OWASP Top Ten vulnerabilities, this post will comment on the A05:2021 - Sec...
A05:2021 – Security misconfiguration
Introduction Vulnerability Description As a continuation of this series of posts on the OWASP Top Ten vulnerabilities, this post will comment on the A05:2021 - Sec...