News
The importance of the Disaster Recovery Plan (DRP)
Despite the fact that cyberattacks, hardware and software failures, natural disasters, or even human errors are increasingly frequent, many companies still lack a Recovery Plan...
The importance of the Disaster Recovery Plan (DRP)
Despite the fact that cyberattacks, hardware and software failures, natural disasters, or even human errors are increasingly frequent, many companies still lack a Recovery Plan...
Obfuscated URLs: The Art of Hiding Malicious Links
Introduction In the current threat landscape, obfuscated URLs are a recurring resource within malicious campaigns. Threat actors resort to this technique not as an end in itself...
Obfuscated URLs: The Art of Hiding Malicious Links
Introduction In the current threat landscape, obfuscated URLs are a recurring resource within malicious campaigns. Threat actors resort to this technique not as an end in itself...
When the weak link has a first and last name
We live in the year 2025, in an era where perimeter security is no longer defined by walls, but by microsegmentation, adaptive authentication, and behavioral analysis. Where EDRs no longer...
When the weak link has a first and last name
We live in the year 2025, in an era where perimeter security is no longer defined by walls, but by microsegmentation, adaptive authentication, and behavioral analysis. Where EDRs no longer...
The forgotten gap: Is your physical security at...
Nowadays, when talking about business security, the conversation always revolves around the same things: firewalls, cyberattacks, secure passwords, digital threats. And it makes perfect sense. Vi...
The forgotten gap: Is your physical security at...
Nowadays, when talking about business security, the conversation always revolves around the same things: firewalls, cyberattacks, secure passwords, digital threats. And it makes perfect sense. Vi...
(1/3) - Current DDoS Situation: Evolution, Tren...
This is the first of three posts in which we will analyze how these threats have evolved and how they impact modern cybersecurity strategies. In this post, we will explore...
(1/3) - Current DDoS Situation: Evolution, Tren...
This is the first of three posts in which we will analyze how these threats have evolved and how they impact modern cybersecurity strategies. In this post, we will explore...
Regulations and standards for the digital foren...
Today the final part of this series of articles will be given, analyzing the latest related UNE standards and addressing the different applicable laws. UNE 71506: Guide for the actions...
Regulations and standards for the digital foren...
Today the final part of this series of articles will be given, analyzing the latest related UNE standards and addressing the different applicable laws. UNE 71506: Guide for the actions...





