News
CEOs, Directors and Cybersecurity
How the DORA regulation and the European NIS2 directive affect Next Tuesday, April 9, 2024, the event will take place where leading experts in law and cybersecurity will analyze the...
CEOs, Directors and Cybersecurity
How the DORA regulation and the European NIS2 directive affect Next Tuesday, April 9, 2024, the event will take place where leading experts in law and cybersecurity will analyze the...
CrossLinked – OSINT tool for email discovery
One part of the OSINT methodology is finding information about people related to the target organization. CrossLinked is an open source tool that allows...
CrossLinked – OSINT tool for email discovery
One part of the OSINT methodology is finding information about people related to the target organization. CrossLinked is an open source tool that allows...
Burpsuit: Intruder
Good morning everyone! Today we will talk about one of the most used and powerful tools within Burp Suite itself to carry out Web audits. Burp Suite is a tool...
Burpsuit: Intruder
Good morning everyone! Today we will talk about one of the most used and powerful tools within Burp Suite itself to carry out Web audits. Burp Suite is a tool...
Analysis of Offensive Cybersecurity Certificati...
In the previous installment of Offensive Cybersecurity Certifications, we were talking about eJPT (Junior Penetration Tester) and eWPT (Web Penetration Tester). During today's delivery I will tell you...
Analysis of Offensive Cybersecurity Certificati...
In the previous installment of Offensive Cybersecurity Certifications, we were talking about eJPT (Junior Penetration Tester) and eWPT (Web Penetration Tester). During today's delivery I will tell you...
Coerce | Part II
Hello again everyone! As promised, we continue with the Coerce saga and in this second part we continue commenting on other vulnerable RPCs: MS-FSRVP MS-FSRVP Es el Remote Procedure C...
Coerce | Part II
Hello again everyone! As promised, we continue with the Coerce saga and in this second part we continue commenting on other vulnerable RPCs: MS-FSRVP MS-FSRVP Es el Remote Procedure C...
Analysis of Offensive Security Certifications |...
Certifications play a crucial role in the world of cybersecurity, fulfilling two main functions. First of all, they help to acquire knowledge and skills in various areas...
Analysis of Offensive Security Certifications |...
Certifications play a crucial role in the world of cybersecurity, fulfilling two main functions. First of all, they help to acquire knowledge and skills in various areas...