News

Estado actual de la ciberseguridad: desafíos y tendencias

Current state of cybersecurity: challenges and ...

JUAN ANTONIO CALLES

Global cybersecurity faces an alarming panorama marked by the increase in advanced threats and key sectors such as finance, health and industry particularly affected. From ransomware that paralyzes operations and...

Current state of cybersecurity: challenges and ...

JUAN ANTONIO CALLES

Global cybersecurity faces an alarming panorama marked by the increase in advanced threats and key sectors such as finance, health and industry particularly affected. From ransomware that paralyzes operations and...

Identification and authentication failures

Identification and authentication failures

Celia Catalán

Identification, authentication, or authorization? First, we must understand the difference between identification and authentication: Identification: It is the process where an identity is provided; a u...

Identification and authentication failures

Celia Catalán

Identification, authentication, or authorization? First, we must understand the difference between identification and authentication: Identification: It is the process where an identity is provided; a u...

Se aprueba el Anteproyecto de Ley de Coordinación y Gobernanza de la Ciberseguridad: NIS2 llega a España

The Draft Law on Coordination and Governance of...

JUAN ANTONIO CALLES

The approval of the draft Law on Coordination and Governance of Cybersecurity represents a milestone in the protection of digital assets in Spain. The transposition of the NIS-2 Directive not...

The Draft Law on Coordination and Governance of...

JUAN ANTONIO CALLES

The approval of the draft Law on Coordination and Governance of Cybersecurity represents a milestone in the protection of digital assets in Spain. The transposition of the NIS-2 Directive not...

I01 – Uso de secuencias de comandos en sitios cruzados (XSS)

I01 – Use of Cross-Site Scripting (XSS)

Celia Catalán

Generally referred to by its English nomenclature, Cross-Site Scripting, this type of vulnerabilities in applications are often underestimated by the development teams of the comp...

I01 – Use of Cross-Site Scripting (XSS)

Celia Catalán

Generally referred to by its English nomenclature, Cross-Site Scripting, this type of vulnerabilities in applications are often underestimated by the development teams of the comp...

La Ciberseguridad en los procesos de Autenticación: Riesgos y Soluciones

Cybersecurity in Authentication processes: Risk...

JUAN ANTONIO CALLES

Authentication systems, such as logins, are a constant target of cyberattacks that seek to violate user security and access sensitive information. From techniques such as brute force, phishing and credential...

Cybersecurity in Authentication processes: Risk...

JUAN ANTONIO CALLES

Authentication systems, such as logins, are a constant target of cyberattacks that seek to violate user security and access sensitive information. From techniques such as brute force, phishing and credential...

¡Flu Project estrena nuevo aspecto!

Flu Project unveils a new look!

Juan Antonio Calles

This December Flu Project will turn 14 years old and we wanted to take advantage of this milestone to show off a new visual appearance, more adapted to the new...

Flu Project unveils a new look!

Juan Antonio Calles

This December Flu Project will turn 14 years old and we wanted to take advantage of this milestone to show off a new visual appearance, more adapted to the new...