News
Deeply analyzing the Outlook NTLM leak vulnerab...
On March 14, 2023, Microsoft published a security patch that corrected the CVE-2023-23397 vulnerability. This critical vulnerability (CVSS 9.8) allowed the attacker to elevate privileges...
Deeply analyzing the Outlook NTLM leak vulnerab...
On March 14, 2023, Microsoft published a security patch that corrected the CVE-2023-23397 vulnerability. This critical vulnerability (CVSS 9.8) allowed the attacker to elevate privileges...
Zero Trust, the paradigm shift in corporate cyb...
As far as protection and prevention in terms of cybersecurity is concerned, the reality today is that the positions of organizations continue to be mostly reactive, rather than pro...
Zero Trust, the paradigm shift in corporate cyb...
As far as protection and prevention in terms of cybersecurity is concerned, the reality today is that the positions of organizations continue to be mostly reactive, rather than pro...
Introduction to mobile application pentesting w...
Before starting to talk about mobile pentesting, we must lay the foundations and differentiate between static analysis of the application and dynamic analysis. But not before talking about the...
Introduction to mobile application pentesting w...
Before starting to talk about mobile pentesting, we must lay the foundations and differentiate between static analysis of the application and dynamic analysis. But not before talking about the...
Is your company protected against “SHING” attacks?
Surely, without a doubt of any kind, in your company you have suffered thousands, if not hundreds, of “SHING type attacks”. What are you betting?! In companies we have a...
Is your company protected against “SHING” attacks?
Surely, without a doubt of any kind, in your company you have suffered thousands, if not hundreds, of “SHING type attacks”. What are you betting?! In companies we have a...
Evidence Hunters: Navigating Email Forensics
When carrying out analyses, whether in the forensic, intelligence, financial or other fields, the search for the truth stands out. The truth as an objective and using reason as a...
Evidence Hunters: Navigating Email Forensics
When carrying out analyses, whether in the forensic, intelligence, financial or other fields, the search for the truth stands out. The truth as an objective and using reason as a...
The bastion of equipment and networks, crucial ...
The protection of existing systems and data in organizations must be the number one priority. There are a multitude of strategies, modus operandi, mechanisms, services and tools to...
The bastion of equipment and networks, crucial ...
The protection of existing systems and data in organizations must be the number one priority. There are a multitude of strategies, modus operandi, mechanisms, services and tools to...