News

CEOs, Consejeros y Ciberseguridad

CEOs, Directors and Cybersecurity

Celia Catalán

How the DORA regulation and the European NIS2 directive affect Next Tuesday, April 9, 2024, the event will take place where leading experts in law and cybersecurity will analyze the...

CEOs, Directors and Cybersecurity

Celia Catalán

How the DORA regulation and the European NIS2 directive affect Next Tuesday, April 9, 2024, the event will take place where leading experts in law and cybersecurity will analyze the...

CrossLinked – Herramienta OSINT para el descubrimiento de emails

CrossLinked – OSINT tool for email discovery

Celia Catalán

One part of the OSINT methodology is finding information about people related to the target organization. CrossLinked is an open source tool that allows...

CrossLinked – OSINT tool for email discovery

Celia Catalán

One part of the OSINT methodology is finding information about people related to the target organization. CrossLinked is an open source tool that allows...

Burpsuit: Intruder

Burpsuit: Intruder

Celia Catalán

Good morning everyone! Today we will talk about one of the most used and powerful tools within Burp Suite itself to carry out Web audits. Burp Suite is a tool...

Burpsuit: Intruder

Celia Catalán

Good morning everyone! Today we will talk about one of the most used and powerful tools within Burp Suite itself to carry out Web audits. Burp Suite is a tool...

Análisis de Certificaciones de Ciberseguridad Ofensiva | Parte II

Analysis of Offensive Cybersecurity Certificati...

Celia Catalán

In the previous installment of Offensive Cybersecurity Certifications, we were talking about eJPT (Junior Penetration Tester) and eWPT (Web Penetration Tester). During today's delivery I will tell you...

Analysis of Offensive Cybersecurity Certificati...

Celia Catalán

In the previous installment of Offensive Cybersecurity Certifications, we were talking about eJPT (Junior Penetration Tester) and eWPT (Web Penetration Tester). During today's delivery I will tell you...

Coerce | Parte II

Coerce | Part II

Celia Catalán

Hello again everyone! As promised, we continue with the Coerce saga and in this second part we continue commenting on other vulnerable RPCs: MS-FSRVP MS-FSRVP Es el Remote Procedure C...

Coerce | Part II

Celia Catalán

Hello again everyone! As promised, we continue with the Coerce saga and in this second part we continue commenting on other vulnerable RPCs: MS-FSRVP MS-FSRVP Es el Remote Procedure C...

Análisis de Certificaciones de Seguridad Ofensiva | Parte I

Analysis of Offensive Security Certifications |...

Celia Catalán

Certifications play a crucial role in the world of cybersecurity, fulfilling two main functions. First of all, they help to acquire knowledge and skills in various areas...

Analysis of Offensive Security Certifications |...

Celia Catalán

Certifications play a crucial role in the world of cybersecurity, fulfilling two main functions. First of all, they help to acquire knowledge and skills in various areas...