Cobalt Strike , the most used tools by criminals
Since 2012, Cobalt Strike has been used as a proactive way to test network defenses against advanced tools, tactics, and…
DNS – How this technology works?
In this system there is a DNS hierarchy of domain names and each site is only responsible for maintaining the…
Ook! language – A language to break in laughter
This language Ook! is another one of those esoteric programming languages that are born from Brainfuck, but this time using…
IPv5 – What happened with this protocol?
IPv5 is version 5 of the IP Protocol defined in 1979 and that did not transcend beyond the experimental field,…
5G Networking, What advantages does it bring?
5G refers to the fifth generation of cellular technology to provide broadband access. It has a standard for increasing the…
INET Framework and what it provides us
INET Framework is an open source model library for the OMNeT ++ simulation environment, which provides protocols, agents and other…
Tux – The Origin of the Linux system logo
Tux is the name of the official Linux mascot. Created by Larry Ewing in 1996, he is a funny-looking little…
PrintNightmare Vulnerability that affects Windows
The problem with the current IT infrastructures that we have in the world is that nobody knows for sure how…
HelloKitty – A threat not as kind as its name says
Ransomware is a type of malware that encrypts files and requires a ransom to decrypt them. It is aimed at…
Charming Kitten, A cunning criminal group
Charming Kitten is a group that has been involved in important events lately, one could be spearphishing which lately enjoys…
