Trends in 2019 for cybersecurity according to the show floor at the RSA Security ConferenceMar 12, 2019
Adiel Lizama Mar 15Let talk about Red Team Exercises A Red Team has the responsibility to challenge established defenses and policies, looking for vulnerabilities that can potentially be...
Adiel Lizama Mar 15Let talk about Red Team Exercises A Red Team has the responsibility to challenge established defenses and policies, looking for vulnerabilities that can potentially be...
Odalys Vasquez Feb 20ISO 27001:2022 STANDARD – A NEW VERSION IN CYBERSECURITYISO 27001 is the international information security standard that assists organizations, no matter their category or size, to manage...
Elisa SosaJan 31Incident Review: Twilio Smishing Attack Smishing Explained. (2019, 22 november). NordVPN. https://nordvpn.com/blog/smishing/ This past August it was reported that Twilio, an...
Jacobo Arzaga Jan 18Hacktivism in Latin-America: Looking back at the SEDENA IncidentLast September news broke out of a massive data breach against the Ministry of National Defense (SEDENA), with a total of 6 TB of...
Francisco CosioJan 3Year in Review: Threat Landscape 2022As we start our 2023, it is important to review the threat landscape for 2022 which will help us identify the patterns and help us...
Elisa SosaOct 20, 2022Cross-Site Scripting 101: Stored vs Reflected, Fortnite, and general sanitizationSgobba, J. P. (2021, July 13). Vulnerabilidad XSS (Cross Site Scripting): Qué es y cómo solucionarla. https://blog.hackmetrix.com/....