News
Red Team 2.0
Many of you will have heard about this concept that has been around for years in the cybersecurity sector, but surely not all of you know what it is about...
Red Team 2.0
Many of you will have heard about this concept that has been around for years in the cybersecurity sector, but surely not all of you know what it is about...
Training Alternatives to Hack The Box
Today there are hundreds of tools that one has if they want to train in the field of cybersecurity. Of course, we have the academic method, with master's degrees and...
Training Alternatives to Hack The Box
Today there are hundreds of tools that one has if they want to train in the field of cybersecurity. Of course, we have the academic method, with master's degrees and...
Cybersecurity Management vs Managed Cybersecurity
Two terms or concepts that apparently seem to be and mean the same thing, but that have nuances that contain subtle differences, depending on the point of view and the...
Cybersecurity Management vs Managed Cybersecurity
Two terms or concepts that apparently seem to be and mean the same thing, but that have nuances that contain subtle differences, depending on the point of view and the...
Alternative tools to NMAP
The Nmap utility, also known as Network Mapper, offers the ability to identify hosts and services within a network, generating a detailed map that reveals the topology of said network....
Alternative tools to NMAP
The Nmap utility, also known as Network Mapper, offers the ability to identify hosts and services within a network, generating a detailed map that reveals the topology of said network....
Predictions on the main cybersecurity threats f...
And, like every year around this time, it is time to analyze what happened in cybersecurity during 2023, see trends, review the state of the art of emerging technologies, study...
Predictions on the main cybersecurity threats f...
And, like every year around this time, it is time to analyze what happened in cybersecurity during 2023, see trends, review the state of the art of emerging technologies, study...
Introduction to mobile application pentesting w...
A few articles ago we gave you a first introduction to mobile application pentesting where we laid the first foundations between what is a static analysis of the application and...
Introduction to mobile application pentesting w...
A few articles ago we gave you a first introduction to mobile application pentesting where we laid the first foundations between what is a static analysis of the application and...