News

La seguridad del dato como eje estratégico e integral de la ciberseguridad corporativa

Data security as a strategic and integral axis ...

Iñigo Ladrón Morales

Data security, business continuity and resilience are fundamental aspects that must be considered transversal and backbones of the corporate cybersecurity strategy...

Data security as a strategic and integral axis ...

Iñigo Ladrón Morales

Data security, business continuity and resilience are fundamental aspects that must be considered transversal and backbones of the corporate cybersecurity strategy...

Riesgos asociados a la suplantación de organizaciones

Risks associated with the impersonation of orga...

Celia Catalán

The increase in Internet use has generated consequences for people's privacy and intimacy. A large amount of personal information can be found indexed in the main search engines...

Risks associated with the impersonation of orga...

Celia Catalán

The increase in Internet use has generated consequences for people's privacy and intimacy. A large amount of personal information can be found indexed in the main search engines...

Ciberinteligencia y OSINT como parte de la seguridad corporativa

Cyber ​​intelligence and OSINT as part of corpo...

Iñigo Ladrón Morales

The imperative need for an excellent level of corporate security/cybersecurity in any type of company is something that, today, is indisputable. All organizations try to i...

Cyber ​​intelligence and OSINT as part of corpo...

Iñigo Ladrón Morales

The imperative need for an excellent level of corporate security/cybersecurity in any type of company is something that, today, is indisputable. All organizations try to i...

Cómo evadir AMSI haciendo uso de DLL Hijacking

How to bypass AMSI using DLL Hijacking

Celia Catalán

Very good to everyone! Today we come with one last installment (for now) about the world of AMSI. On this occasion, we are going to discover how we could evade...

How to bypass AMSI using DLL Hijacking

Celia Catalán

Very good to everyone! Today we come with one last installment (for now) about the world of AMSI. On this occasion, we are going to discover how we could evade...

OPSEC, estrategia de protección de información crítica y sensible

OPSEC, critical and sensitive information prote...

Iñigo Ladrón Morales

That information (both personal and corporate) is power is nothing new. Furthermore, with it (whether it is used well or poorly) very profitable businesses can be generated, even...

OPSEC, critical and sensitive information prote...

Iñigo Ladrón Morales

That information (both personal and corporate) is power is nothing new. Furthermore, with it (whether it is used well or poorly) very profitable businesses can be generated, even...

Ligolo-ng, pivoting avanzado de la mano de Go

Ligolo-ng, advanced pivoting of the Go hand

Celia Catalán

Very good, during this installment we will talk about a tool that makes the topic of tunnels much easier. Don't get lost in it! . Ligolo-ng is a simple, light...

Ligolo-ng, advanced pivoting of the Go hand

Celia Catalán

Very good, during this installment we will talk about a tool that makes the topic of tunnels much easier. Don't get lost in it! . Ligolo-ng is a simple, light...