News

¿Cuáles son las principales amenazas, riesgos y retos de ciberseguridad a los que se enfrentan las empresas?

What are the main cybersecurity threats, risks ...

Iñigo Ladrón Morales

Exposure to cyber-threats and cyber-risks by companies is still there and will never cease to exist, increasing enormously every day, in terms of volume of cases and in how...

What are the main cybersecurity threats, risks ...

Iñigo Ladrón Morales

Exposure to cyber-threats and cyber-risks by companies is still there and will never cease to exist, increasing enormously every day, in terms of volume of cases and in how...

Analizando a fondo la vulnerabilidad Outlook NTLM leak (CVE-2023-23397)

Deeply analyzing the Outlook NTLM leak vulnerab...

Celia Catalán

On March 14, 2023, Microsoft published a security patch that corrected the CVE-2023-23397 vulnerability. This critical vulnerability (CVSS 9.8) allowed the attacker to elevate privileges...

Deeply analyzing the Outlook NTLM leak vulnerab...

Celia Catalán

On March 14, 2023, Microsoft published a security patch that corrected the CVE-2023-23397 vulnerability. This critical vulnerability (CVSS 9.8) allowed the attacker to elevate privileges...

Zero Trust, el cambio de paradigma en la ciberseguridad corporativa

Zero Trust, the paradigm shift in corporate cyb...

Iñigo Ladrón Morales

As far as protection and prevention in terms of cybersecurity is concerned, the reality today is that the positions of organizations continue to be mostly reactive, rather than pro...

Zero Trust, the paradigm shift in corporate cyb...

Iñigo Ladrón Morales

As far as protection and prevention in terms of cybersecurity is concerned, the reality today is that the positions of organizations continue to be mostly reactive, rather than pro...

Introducción al pentesting de aplicaciones móviles sin morir en el intento

Introduction to mobile application pentesting w...

Celia Catalán

Before starting to talk about mobile pentesting, we must lay the foundations and differentiate between static analysis of the application and dynamic analysis. But not before talking about the...

Introduction to mobile application pentesting w...

Celia Catalán

Before starting to talk about mobile pentesting, we must lay the foundations and differentiate between static analysis of the application and dynamic analysis. But not before talking about the...

¿Está tu empresa protegida contra ataques “SHING”?

Is your company protected against “SHING” attacks?

Iñigo Ladrón Morales

Surely, without a doubt of any kind, in your company you have suffered thousands, if not hundreds, of “SHING type attacks”. What are you betting?! In companies we have a...

Is your company protected against “SHING” attacks?

Iñigo Ladrón Morales

Surely, without a doubt of any kind, in your company you have suffered thousands, if not hundreds, of “SHING type attacks”. What are you betting?! In companies we have a...

Cazadores de Evidencia: Navegando por el Análisis Forense de Correos Electrónicos

Evidence Hunters: Navigating Email Forensics

Celia Catalán

When carrying out analyses, whether in the forensic, intelligence, financial or other fields, the search for the truth stands out. The truth as an objective and using reason as a...

Evidence Hunters: Navigating Email Forensics

Celia Catalán

When carrying out analyses, whether in the forensic, intelligence, financial or other fields, the search for the truth stands out. The truth as an objective and using reason as a...