recent publications

Custom Browser Analysis

Custom Browser Analysis

read
Digital Signature What is it and how  to get it for free?

Digital Signature What is it and how to get it for free?

read
Follina a silent Client-Side

Follina a silent Client-Side

read
Digital Signature What is it and how  to get it for free?

Decanting cyber threats for 2023

read
Digital Signature What is it and how  to get it for free?

Command injection on router

read
Digital Signature What is it and how  to get it for free?

Phishing, MFA and other condiments

read
Digital Signature What is it and how  to get it for free?

2FA bypassing 101

read
Digital Signature What is it and how  to get it for free?

Active Cyber Defense: Theoretical Approaches

read
Digital Signature What is it and how  to get it for free?

Dangers on Linkedin?

read
Digital Signature What is it and how  to get it for free?

Active cyber defense: an introduction to a new approach to cybersecurity.

read
Digital Signature What is it and how  to get it for free?

DNS Sinkholing from an active point of view

read
Digital Signature What is it and how  to get it for free?

Beaconing: Tracking attackers

read
Digital Signature What is it and how  to get it for free?

REVOLVING THE HONEYPOT:

read
Digital Signature What is it and how  to get it for free?

Honeypots: traps for the adversary

read
Digital Signature What is it and how  to get it for free?

The great (incident response) simulator

read
Digital Signature What is it and how  to get it for free?

TTX Simulation Exercises (II)

read
Digital Signature What is it and how  to get it for free?

TTX Simulation Exercises (I)

read
Automatizando despliegue de proxys con Python

DNS Tunneling

read
Automatizando despliegue de proxys con Python

TRAINING WITHOUT GETTING BORED: Gamification of training

read
Automatizando despliegue de proxys con Python

MITRE Engage: The best defense is a good offense

read
Automatizando despliegue de proxys con Python

Identity and Access Management: Why do organizations need it?

read
Automatizando despliegue de proxys con Python

Opinion Note: May the Cybersecurity Community Keep Growing!

read
Automatizando despliegue de proxys con Python

Netwoker: One more way to own Networker

read