News

'Our Experience at #RootedCON2025: A Commitment...
From March 3 to 8, the most important cybersecurity conference in Spain, RootedCON, was held. An event that year after year brings together experts, enthusiasts, and professionals from the sector...
'Our Experience at #RootedCON2025: A Commitment...
From March 3 to 8, the most important cybersecurity conference in Spain, RootedCON, was held. An event that year after year brings together experts, enthusiasts, and professionals from the sector...

Zerolynx joins Grupo Cybertix to lead cybersecu...
The integration of Zerolynx into the Cybertix Group marks a milestone in cybersecurity for SMEs, combining automation, artificial intelligence, and a team of over 60 experts to enhance detection, prevention,...
Zerolynx joins Grupo Cybertix to lead cybersecu...
The integration of Zerolynx into the Cybertix Group marks a milestone in cybersecurity for SMEs, combining automation, artificial intelligence, and a team of over 60 experts to enhance detection, prevention,...

Do you know our Offensive Detection and Securit...
At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...
Do you know our Offensive Detection and Securit...
At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...

Do you know our Incident Response and Digital F...
At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...
Do you know our Incident Response and Digital F...
At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...

Do you know what the CIS Security Controls Matr...
Due to the proliferation of cyber threats, which are increasingly complex and sophisticated, it is essential to have a robust framework to protect digital assets against potential cyberattacks and cyber...
Do you know what the CIS Security Controls Matr...
Due to the proliferation of cyber threats, which are increasingly complex and sophisticated, it is essential to have a robust framework to protect digital assets against potential cyberattacks and cyber...

Exploring Active Directory (AD): Attack Bootcam...
Active Directory (AD) is a key component in the infrastructure of numerous organizations, managing authentication, authorization, and security policies in Windows environments. Due to its ...
Exploring Active Directory (AD): Attack Bootcam...
Active Directory (AD) is a key component in the infrastructure of numerous organizations, managing authentication, authorization, and security policies in Windows environments. Due to its ...