News

Exploring Active Directory (AD): Attack Bootcam...
Active Directory (AD) is a key component in the infrastructure of numerous organizations, managing authentication, authorization, and security policies in Windows environments. Due to its ...
Exploring Active Directory (AD): Attack Bootcam...
Active Directory (AD) is a key component in the infrastructure of numerous organizations, managing authentication, authorization, and security policies in Windows environments. Due to its ...

MITER y su framework MITER ATT&CK
Along the way, the daily and continuous work of the fight against cyber threats and in favor of a better level of cybersecurity , MITER , and its framework MITER...
MITER y su framework MITER ATT&CK
Along the way, the daily and continuous work of the fight against cyber threats and in favor of a better level of cybersecurity , MITER , and its framework MITER...

"Is your website at risk? Discover why outdated...
Vulnerable and Outdated Components Introduction Modern web applications follow multi-component software architectures such as databases, APIs (Application Programming Interface), b...
"Is your website at risk? Discover why outdated...
Vulnerable and Outdated Components Introduction Modern web applications follow multi-component software architectures such as databases, APIs (Application Programming Interface), b...

Do you know our Incident Recovery services, bas...
At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...
Do you know our Incident Recovery services, bas...
At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...

The Achilles' heel of cryptography: how PRNGs c...
A02:2021 - Cryptographic failures – Pseudorandom Number Generators (PRNG) Introduction The generation of random numbers in programming is crucial for many applications, especially in...
The Achilles' heel of cryptography: how PRNGs c...
A02:2021 - Cryptographic failures – Pseudorandom Number Generators (PRNG) Introduction The generation of random numbers in programming is crucial for many applications, especially in...

Secure Development: A fundamental pillar for th...
Secure development is an essential approach to creating threat-resistant software, integrating security measures from design to maintenance. Based on standards such as OWASP ASVS, it ensures effective controls in key...
Secure Development: A fundamental pillar for th...
Secure development is an essential approach to creating threat-resistant software, integrating security measures from design to maintenance. Based on standards such as OWASP ASVS, it ensures effective controls in key...