News

La Ciberseguridad en los procesos de Autenticación: Riesgos y Soluciones

Cybersecurity in Authentication processes: Risk...

JUAN ANTONIO CALLES

Authentication systems, such as logins, are a constant target of cyberattacks that seek to violate user security and access sensitive information. From techniques such as brute force, phishing and credential...

Cybersecurity in Authentication processes: Risk...

JUAN ANTONIO CALLES

Authentication systems, such as logins, are a constant target of cyberattacks that seek to violate user security and access sensitive information. From techniques such as brute force, phishing and credential...

¡Flu Project estrena nuevo aspecto!

Flu Project unveils a new look!

Juan Antonio Calles

This December Flu Project will turn 14 years old and we wanted to take advantage of this milestone to show off a new visual appearance, more adapted to the new...

Flu Project unveils a new look!

Juan Antonio Calles

This December Flu Project will turn 14 years old and we wanted to take advantage of this milestone to show off a new visual appearance, more adapted to the new...

A10:2021 – Server-Side Request Forgery (SSRF)

A10:2021 – Server-Side Request Forgery (SSRF)

Celia Catalán

Description The 'Server-Side Request Forgery' (SSRF) attack is a type of attack in which an attacker abuses the functionality of a server to make HTTP requests to internal resources or...

A10:2021 – Server-Side Request Forgery (SSRF)

Celia Catalán

Description The 'Server-Side Request Forgery' (SSRF) attack is a type of attack in which an attacker abuses the functionality of a server to make HTTP requests to internal resources or...

Zerolynx: referencia en Tests TLPT - Red Team para el sector financiero

Zerolynx: reference in TLPT Tests - Red Team fo...

Juan Antonio Calles

The DORA (Digital Operational Resilience Act) regulation, adopted by the European Union, establishes a regulatory framework to strengthen the digital operational resilience of financial entities,...

Zerolynx: reference in TLPT Tests - Red Team fo...

Juan Antonio Calles

The DORA (Digital Operational Resilience Act) regulation, adopted by the European Union, establishes a regulatory framework to strengthen the digital operational resilience of financial entities,...

La serie ISO 27000: Más allá de las ISO 27001 y 27002

The ISO 27000 series: Beyond ISO 27001 and 27002

JUAN ANTONIO CALLES

The ISO 27000 series is key to information security management, covering much more than the well-known ISO 27001. Standards such as ISO 27017 and 27018 strengthen security and privacy in...

The ISO 27000 series: Beyond ISO 27001 and 27002

JUAN ANTONIO CALLES

The ISO 27000 series is key to information security management, covering much more than the well-known ISO 27001. Standards such as ISO 27017 and 27018 strengthen security and privacy in...

A05:2021 – Security misconfiguration

A05:2021 – Security misconfiguration

Celia Catalán

Introduction Vulnerability Description  As a continuation of this series of posts on the OWASP Top Ten vulnerabilities, this post will comment on the A05:2021 - Sec...

A05:2021 – Security misconfiguration

Celia Catalán

Introduction Vulnerability Description  As a continuation of this series of posts on the OWASP Top Ten vulnerabilities, this post will comment on the A05:2021 - Sec...