News

Alternativas de entrenamiento a Hack The Box

Training Alternatives to Hack The Box

Celia Catalán

Today there are hundreds of tools that one has if they want to train in the field of cybersecurity. Of course, we have the academic method, with master's degrees and...

Training Alternatives to Hack The Box

Celia Catalán

Today there are hundreds of tools that one has if they want to train in the field of cybersecurity. Of course, we have the academic method, with master's degrees and...

Gestión de la Ciberseguridad vs Ciberseguridad Gestionada

Cybersecurity Management vs Managed Cybersecurity

Iñigo Ladrón Morales

Two terms or concepts that apparently seem to be and mean the same thing, but that have nuances that contain subtle differences, depending on the point of view and the...

Cybersecurity Management vs Managed Cybersecurity

Iñigo Ladrón Morales

Two terms or concepts that apparently seem to be and mean the same thing, but that have nuances that contain subtle differences, depending on the point of view and the...

Herramientas alternativas a NMAP

Alternative tools to NMAP

Celia Catalán

The Nmap utility, also known as Network Mapper, offers the ability to identify hosts and services within a network, generating a detailed map that reveals the topology of said network....

Alternative tools to NMAP

Celia Catalán

The Nmap utility, also known as Network Mapper, offers the ability to identify hosts and services within a network, generating a detailed map that reveals the topology of said network....

Predicciones sobre las principales amenazas de ciberseguridad para 2024

Predictions on the main cybersecurity threats f...

Iñigo Ladrón Morales

And, like every year around this time, it is time to analyze what happened in cybersecurity during 2023, see trends, review the state of the art of emerging technologies, study...

Predictions on the main cybersecurity threats f...

Iñigo Ladrón Morales

And, like every year around this time, it is time to analyze what happened in cybersecurity during 2023, see trends, review the state of the art of emerging technologies, study...

Introducción al pentesting de aplicaciones móviles sin morir en el intento. Parte II

Introduction to mobile application pentesting w...

Celia Catalán

A few articles ago we gave you a first introduction to mobile application pentesting where we laid the first foundations between what is a static analysis of the application and...

Introduction to mobile application pentesting w...

Celia Catalán

A few articles ago we gave you a first introduction to mobile application pentesting where we laid the first foundations between what is a static analysis of the application and...

¿Cuáles son las principales amenazas, riesgos y retos de ciberseguridad a los que se enfrentan las empresas?

What are the main cybersecurity threats, risks ...

Iñigo Ladrón Morales

Exposure to cyber-threats and cyber-risks by companies is still there and will never cease to exist, increasing enormously every day, in terms of volume of cases and in how...

What are the main cybersecurity threats, risks ...

Iñigo Ladrón Morales

Exposure to cyber-threats and cyber-risks by companies is still there and will never cease to exist, increasing enormously every day, in terms of volume of cases and in how...