News

La importancia del Disaster Recovery Plan (DRP)

The importance of the Disaster Recovery Plan (DRP)

Celia Catalán

Despite the fact that cyberattacks, hardware and software failures, natural disasters, or even human errors are increasingly frequent, many companies still lack a Recovery Plan...

The importance of the Disaster Recovery Plan (DRP)

Celia Catalán

Despite the fact that cyberattacks, hardware and software failures, natural disasters, or even human errors are increasingly frequent, many companies still lack a Recovery Plan...

URL Ofuscadas: El Arte de Ocultar Enlaces Maliciosos

Obfuscated URLs: The Art of Hiding Malicious Links

Celia Catalán

Introduction In the current threat landscape, obfuscated URLs are a recurring resource within malicious campaigns. Threat actors resort to this technique not as an end in itself...

Obfuscated URLs: The Art of Hiding Malicious Links

Celia Catalán

Introduction In the current threat landscape, obfuscated URLs are a recurring resource within malicious campaigns. Threat actors resort to this technique not as an end in itself...

Cuando el eslabón débil tiene nombre y apellidos

When the weak link has a first and last name

Celia Catalán

We live in the year 2025, in an era where perimeter security is no longer defined by walls, but by microsegmentation, adaptive authentication, and behavioral analysis. Where EDRs no longer...

When the weak link has a first and last name

Celia Catalán

We live in the year 2025, in an era where perimeter security is no longer defined by walls, but by microsegmentation, adaptive authentication, and behavioral analysis. Where EDRs no longer...

La brecha olvidada: ¿Tu seguridad física está en riesgo?

The forgotten gap: Is your physical security at...

Celia Catalán

Nowadays, when talking about business security, the conversation always revolves around the same things: firewalls, cyberattacks, secure passwords, digital threats. And it makes perfect sense. Vi...

The forgotten gap: Is your physical security at...

Celia Catalán

Nowadays, when talking about business security, the conversation always revolves around the same things: firewalls, cyberattacks, secure passwords, digital threats. And it makes perfect sense. Vi...

(1/3) - Situación actual del DDoS: evolución, tendencias, impacto y estrategias de respuesta

(1/3) - Current DDoS Situation: Evolution, Tren...

Celia Catalán

This is the first of three posts in which we will analyze how these threats have evolved and how they impact modern cybersecurity strategies. In this post, we will explore...

(1/3) - Current DDoS Situation: Evolution, Tren...

Celia Catalán

This is the first of three posts in which we will analyze how these threats have evolved and how they impact modern cybersecurity strategies. In this post, we will explore...

Normativas y estándares para el ámbito forense digital (III de III)

Regulations and standards for the digital foren...

Juan Antonio Calles

Today the final part of this series of articles will be given, analyzing the latest related UNE standards and addressing the different applicable laws. UNE 71506: Guide for the actions...

Regulations and standards for the digital foren...

Juan Antonio Calles

Today the final part of this series of articles will be given, analyzing the latest related UNE standards and addressing the different applicable laws. UNE 71506: Guide for the actions...