News

¿Conoces nuestros servicios de Respuesta ante Incidentes y Análisis Forense Digital, basados en NIST CSF?

Do you know our Incident Response and Digital F...

Iñigo Ladrón Morales

At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...

Do you know our Incident Response and Digital F...

Iñigo Ladrón Morales

At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...

¿Sabes qué es la Matriz de Controles CIS de seguridad?

Do you know what the CIS Security Controls Matr...

Iñigo Ladrón Morales

Due to the proliferation of cyber threats, which are increasingly complex and sophisticated, it is essential to have a robust framework to protect digital assets against potential cyberattacks and cyber...

Do you know what the CIS Security Controls Matr...

Iñigo Ladrón Morales

Due to the proliferation of cyber threats, which are increasingly complex and sophisticated, it is essential to have a robust framework to protect digital assets against potential cyberattacks and cyber...

Explorando el Directorio Activo (AD): Bootcamp de ataques en RootedCON 2025

Exploring Active Directory (AD): Attack Bootcam...

Celia Catalán

Active Directory (AD) is a key component in the infrastructure of numerous organizations, managing authentication, authorization, and security policies in Windows environments. Due to its ...

Exploring Active Directory (AD): Attack Bootcam...

Celia Catalán

Active Directory (AD) is a key component in the infrastructure of numerous organizations, managing authentication, authorization, and security policies in Windows environments. Due to its ...

MITRE y su framework MITRE ATT&CK

MITER y su framework MITER ATT&CK

Iñigo Ladrón Morales

Along the way, the daily and continuous work of the fight against cyber threats and in favor of a better level of cybersecurity , MITER , and its framework MITER...

MITER y su framework MITER ATT&CK

Iñigo Ladrón Morales

Along the way, the daily and continuous work of the fight against cyber threats and in favor of a better level of cybersecurity , MITER , and its framework MITER...

¿Tu web está en riesgo? Descubre por qué las librerías obsoletas son una bomba de tiempo

"Is your website at risk? Discover why outdated...

Celia Catalán

Vulnerable and Outdated Components Introduction Modern web applications follow multi-component software architectures such as databases, APIs (Application Programming Interface), b...

"Is your website at risk? Discover why outdated...

Celia Catalán

Vulnerable and Outdated Components Introduction Modern web applications follow multi-component software architectures such as databases, APIs (Application Programming Interface), b...

¿Conoces nuestros servicios de Recuperación tras Incidentes, basados en NIST CSF?

Do you know our Incident Recovery services, bas...

Iñigo Ladrón Morales

At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...

Do you know our Incident Recovery services, bas...

Iñigo Ladrón Morales

At Zerolynx we are experts in professional services for companies in terms of cybersecurity. Specifically in corporate security, cybersecurity corporate, intelligence corporate, cyberintelligence corporate and patrimonial security. Our services are...