News

MITRE y su framework MITRE ATT&CK

MITER y su framework MITER ATT&CK

Iñigo Ladrón Morales

Along the way, the daily and continuous work of the fight against cyber threats and in favor of a better level of cybersecurity , MITER , and its framework MITER...

MITER y su framework MITER ATT&CK

Iñigo Ladrón Morales

Along the way, the daily and continuous work of the fight against cyber threats and in favor of a better level of cybersecurity , MITER , and its framework MITER...

¿Tu web está en riesgo? Descubre por qué las librerías obsoletas son una bomba de tiempo

"Is your website at risk? Discover why outdated...

Celia Catalán

Vulnerable and Outdated Components Introduction Modern web applications follow multi-component software architectures such as databases, APIs (Application Programming Interface), b...

"Is your website at risk? Discover why outdated...

Celia Catalán

Vulnerable and Outdated Components Introduction Modern web applications follow multi-component software architectures such as databases, APIs (Application Programming Interface), b...

¿Conoces nuestros servicios de Recuperación tras Incidentes, basados en NIST CSF?

Do you know our Incident Recovery services, bas...

Iñigo Ladrón Morales

At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...

Do you know our Incident Recovery services, bas...

Iñigo Ladrón Morales

At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...

El talón de Aquiles de la criptografía: cómo los PRNG pueden arruinar tu seguridad

The Achilles' heel of cryptography: how PRNGs c...

Celia Catalán

A02:2021 - Cryptographic failures – Pseudorandom Number Generators (PRNG) Introduction The generation of random numbers in programming is crucial for many applications, especially in...

The Achilles' heel of cryptography: how PRNGs c...

Celia Catalán

A02:2021 - Cryptographic failures – Pseudorandom Number Generators (PRNG) Introduction The generation of random numbers in programming is crucial for many applications, especially in...

El Desarrollo Seguro: Un pilar fundamental para la protección de nuestro negocio

Secure Development: A fundamental pillar for th...

JUAN ANTONIO CALLES

Secure development is an essential approach to creating threat-resistant software, integrating security measures from design to maintenance. Based on standards such as OWASP ASVS, it ensures effective controls in key...

Secure Development: A fundamental pillar for th...

JUAN ANTONIO CALLES

Secure development is an essential approach to creating threat-resistant software, integrating security measures from design to maintenance. Based on standards such as OWASP ASVS, it ensures effective controls in key...

A08:2021 - Software and Data Integrity Failures

A08:2021 - Software and Data Integrity Failures

Celia Catalán

In this chapter of the OWASP Top Ten, we are going to talk about the vulnerability A08:2021 - Software and Data Integrity Failures or in Spanish A08:2021 - Failures in...

A08:2021 - Software and Data Integrity Failures

Celia Catalán

In this chapter of the OWASP Top Ten, we are going to talk about the vulnerability A08:2021 - Software and Data Integrity Failures or in Spanish A08:2021 - Failures in...