News

Cazadores de Evidencia: Navegando por el Análisis Forense de Correos Electrónicos

Evidence Hunters: Navigating Email Forensics

Celia Catalán

When carrying out analyses, whether in the forensic, intelligence, financial or other fields, the search for the truth stands out. The truth as an objective and using reason as a...

Evidence Hunters: Navigating Email Forensics

Celia Catalán

When carrying out analyses, whether in the forensic, intelligence, financial or other fields, the search for the truth stands out. The truth as an objective and using reason as a...

El bastionado de equipos y redes, crucial en la ciberseguridad corporativa

The bastion of equipment and networks, crucial ...

Iñigo Ladrón Morales

The protection of existing systems and data in organizations must be the number one priority. There are a multitude of strategies, modus operandi, mechanisms, services and tools to...

The bastion of equipment and networks, crucial ...

Iñigo Ladrón Morales

The protection of existing systems and data in organizations must be the number one priority. There are a multitude of strategies, modus operandi, mechanisms, services and tools to...

Entre Bits y Valores: El Debate Ético en Torno al Cifrado de Extremo a Extremo

Between Bits and Values: The Ethical Debate Aro...

Celia Catalán

What is end-to-end encryption and why is it important? Over the last decade, information security has been gaining greater importance and awareness, where one of the aspects...

Between Bits and Values: The Ethical Debate Aro...

Celia Catalán

What is end-to-end encryption and why is it important? Over the last decade, information security has been gaining greater importance and awareness, where one of the aspects...

Así se hizo desde Zerolynx el programa de Equipo de Investigación de la Sexta "Las Estafas de los Famosos"

This is how the Research Team program of the Si...

Juan Antonio Calles

Last Friday, November 17, the La Sexta Investigation Team program dedicated a program to cryptocurrency scams, more specifically, to Celebrity Scams, a lucrative scam...

This is how the Research Team program of the Si...

Juan Antonio Calles

Last Friday, November 17, the La Sexta Investigation Team program dedicated a program to cryptocurrency scams, more specifically, to Celebrity Scams, a lucrative scam...

Auditoría básica de ciberseguridad a un dominio de Microsoft

Basic cybersecurity audit of a Microsoft domain

Celia Catalán

Active Directory Directory) is a critical component in the infrastructure of many organizations, used to manage resources and users in environments Windows. The Audit of Di...

Basic cybersecurity audit of a Microsoft domain

Celia Catalán

Active Directory Directory) is a critical component in the infrastructure of many organizations, used to manage resources and users in environments Windows. The Audit of Di...

La seguridad del dato como eje estratégico e integral de la ciberseguridad corporativa

Data security as a strategic and integral axis ...

Iñigo Ladrón Morales

Data security, business continuity and resilience are fundamental aspects that must be considered transversal and backbones of the corporate cybersecurity strategy...

Data security as a strategic and integral axis ...

Iñigo Ladrón Morales

Data security, business continuity and resilience are fundamental aspects that must be considered transversal and backbones of the corporate cybersecurity strategy...