News

Cómo identificar y evitar el Phishing en correos electrónicos

How to identify and avoid Phishing in emails

Celia Catalán

Despite being one of the most common social engineering and cyberattack techniques in the Currently, phishing continues to be a strong entry vector for attack used by many cybercriminals...

How to identify and avoid Phishing in emails

Celia Catalán

Despite being one of the most common social engineering and cyberattack techniques in the Currently, phishing continues to be a strong entry vector for attack used by many cybercriminals...

Los riesgos del Shadow IT en las organizaciones

The risks of Shadow IT in organizations

Iñigo Ladrón Morales

Curious term that of Shadow IT. Something like “Shadow or ghost of IT”, which consists of the set of all systems, services, applications, software and devices that employees...

The risks of Shadow IT in organizations

Iñigo Ladrón Morales

Curious term that of Shadow IT. Something like “Shadow or ghost of IT”, which consists of the set of all systems, services, applications, software and devices that employees...

Introducción a AMSI

Introduction to AMSI

Celia Catalán

Very good to everyone! Today we are going to immerse ourselves in the world of AMSI. You've probably heard of them, but do you really know how they work? Okay,...

Introduction to AMSI

Celia Catalán

Very good to everyone! Today we are going to immerse ourselves in the world of AMSI. You've probably heard of them, but do you really know how they work? Okay,...

Protección de datos empresariales, exfiltración y fuga de datos

Enterprise data protection, exfiltration and da...

Iñigo Ladrón Morales

The protection of business data is increasingly complex due to the sophistication of the techniques, mechanisms and technologies used by cybercriminals. This makes the use of...

Enterprise data protection, exfiltration and da...

Iñigo Ladrón Morales

The protection of business data is increasingly complex due to the sophistication of the techniques, mechanisms and technologies used by cybercriminals. This makes the use of...

Riesgos corporativos derivados del uso de ChatGPT

Corporate risks arising from the use of ChatGPT

Celia Catalán

At the end of November 2022, the artificial intelligence (AI) chatbot prototype, ChatGPT, developed by the OpenAI organization, was published. A few months later, in March 2023,...

Corporate risks arising from the use of ChatGPT

Celia Catalán

At the end of November 2022, the artificial intelligence (AI) chatbot prototype, ChatGPT, developed by the OpenAI organization, was published. A few months later, in March 2023,...

Zerolynx arranca el curso escolar de la Universidad Europea de Madrid

Zerolynx starts the school year at the European...

Celia Catalán

Last September 11 marked the beginning of a new academic year at the UEM. Juan Antonio Calles, CEO of Zerolynx, participated in one of the round tables designed to welcome...

Zerolynx starts the school year at the European...

Celia Catalán

Last September 11 marked the beginning of a new academic year at the UEM. Juan Antonio Calles, CEO of Zerolynx, participated in one of the round tables designed to welcome...