News

Current state of cybersecurity: challenges and ...
Global cybersecurity faces an alarming panorama marked by the increase in advanced threats and key sectors such as finance, health and industry particularly affected. From ransomware that paralyzes operations and...
Current state of cybersecurity: challenges and ...
Global cybersecurity faces an alarming panorama marked by the increase in advanced threats and key sectors such as finance, health and industry particularly affected. From ransomware that paralyzes operations and...

Identification and authentication failures
Identification, authentication, or authorization? First, we must understand the difference between identification and authentication: Identification: It is the process where an identity is provided; a u...
Identification and authentication failures
Identification, authentication, or authorization? First, we must understand the difference between identification and authentication: Identification: It is the process where an identity is provided; a u...

The Draft Law on Coordination and Governance of...
The approval of the draft Law on Coordination and Governance of Cybersecurity represents a milestone in the protection of digital assets in Spain. The transposition of the NIS-2 Directive not...
The Draft Law on Coordination and Governance of...
The approval of the draft Law on Coordination and Governance of Cybersecurity represents a milestone in the protection of digital assets in Spain. The transposition of the NIS-2 Directive not...

I01 – Use of Cross-Site Scripting (XSS)
Generally referred to by its English nomenclature, Cross-Site Scripting, this type of vulnerabilities in applications are often underestimated by the development teams of the comp...
I01 – Use of Cross-Site Scripting (XSS)
Generally referred to by its English nomenclature, Cross-Site Scripting, this type of vulnerabilities in applications are often underestimated by the development teams of the comp...

Cybersecurity in Authentication processes: Risk...
Authentication systems, such as logins, are a constant target of cyberattacks that seek to violate user security and access sensitive information. From techniques such as brute force, phishing and credential...
Cybersecurity in Authentication processes: Risk...
Authentication systems, such as logins, are a constant target of cyberattacks that seek to violate user security and access sensitive information. From techniques such as brute force, phishing and credential...

Flu Project unveils a new look!
This December Flu Project will turn 14 years old and we wanted to take advantage of this milestone to show off a new visual appearance, more adapted to the new...
Flu Project unveils a new look!
This December Flu Project will turn 14 years old and we wanted to take advantage of this milestone to show off a new visual appearance, more adapted to the new...