Image

Content-Security Policy (CSP) y cómo (no) confiar ciegamente en ella

El Content-Security Policy (CSP) es una de las defensas más…


Image

COD4MW Cheat: A Reverse Engineering Adventure

If you enjoy playing online games, you’ve probably heard…


Image

¿Tu empresa esta preparada para la nueva ley de ciberseguridad de Chile?

Desde este año entró en vigencia una ley modelo de…


Image

Advisory: Multiple vulnerabilities affecting Draytek routers

Routers are critical to modern networks, acting as the…


Image

Car Hacking with Doggie at H2HC!

Last month, Doggie took the stage at the Car Hacking…


Image

Good practices in Cybersecurity – Part 3

Good security practices go hand in hand with automation,…


Image

Good practices in Cybersecurity – Part 2

Nowadays, we can distinguish various branches within a…


Image

Tips Nmap Script Engine

Nmap (Network Mapper) is a popular network scanner that…


Image

Release v4.3.5

We are happy to share the latest updates of our…


Image

Web Application pentesting: a guide

In Security, the concept of attack-surface (or attack…


Privacy Preference Center