News
Alternative tools to NMAP
The Nmap utility, also known as Network Mapper, offers the ability to identify hosts and services within a network, generating a detailed map that reveals the topology of said network....
Alternative tools to NMAP
The Nmap utility, also known as Network Mapper, offers the ability to identify hosts and services within a network, generating a detailed map that reveals the topology of said network....
Predictions on the main cybersecurity threats f...
And, like every year around this time, it is time to analyze what happened in cybersecurity during 2023, see trends, review the state of the art of emerging technologies, study...
Predictions on the main cybersecurity threats f...
And, like every year around this time, it is time to analyze what happened in cybersecurity during 2023, see trends, review the state of the art of emerging technologies, study...
Introduction to mobile application pentesting w...
A few articles ago we gave you a first introduction to mobile application pentesting where we laid the first foundations between what is a static analysis of the application and...
Introduction to mobile application pentesting w...
A few articles ago we gave you a first introduction to mobile application pentesting where we laid the first foundations between what is a static analysis of the application and...
What are the main cybersecurity threats, risks ...
Exposure to cyber-threats and cyber-risks by companies is still there and will never cease to exist, increasing enormously every day, in terms of volume of cases and in how...
What are the main cybersecurity threats, risks ...
Exposure to cyber-threats and cyber-risks by companies is still there and will never cease to exist, increasing enormously every day, in terms of volume of cases and in how...
Deeply analyzing the Outlook NTLM leak vulnerab...
On March 14, 2023, Microsoft published a security patch that corrected the CVE-2023-23397 vulnerability. This critical vulnerability (CVSS 9.8) allowed the attacker to elevate privileges...
Deeply analyzing the Outlook NTLM leak vulnerab...
On March 14, 2023, Microsoft published a security patch that corrected the CVE-2023-23397 vulnerability. This critical vulnerability (CVSS 9.8) allowed the attacker to elevate privileges...
Zero Trust, the paradigm shift in corporate cyb...
As far as protection and prevention in terms of cybersecurity is concerned, the reality today is that the positions of organizations continue to be mostly reactive, rather than pro...
Zero Trust, the paradigm shift in corporate cyb...
As far as protection and prevention in terms of cybersecurity is concerned, the reality today is that the positions of organizations continue to be mostly reactive, rather than pro...