ENISA – Agency of expertise in Cybersecurity
ENISA, the European Union Agency for Cybersecurity, is a center of expertise for Cybersecurity in Europe. ENISA helps the EU…
IoT Botnet Attacks – A problem for Cybersecurity
This raises is one that many in the security industry have been asking the most. Internet of Things (IoT) botnet…
21H1 Update – Arrive of Teleworking on windows
This 21H1 update, according to Microsoft, is already directly influenced by the pandemic and what has happened in the last…
What is a Negative SEO Attack
The threat of negative SEO is remote but overwhelming. Negative SEO is a set of activities aimed at lowering a…
Browser extensions – Be very careful with these
Browser extensions are applets within a browser that add functionality. Commonly used extensions are, for example, Adblockers, Colorpickers, CRM integrations,…
Encrypted Virus – How Dangerous are these
The encrypted virus is a computer virus that encrypts its payload with the intention of making it difficult to detect…
What is Traceroute or Tracert and how to use it
Many times we users can find that we cannot access a computer on our network, a website, a resource on…
NAS – What does this device offer
The data and information that a company handles are essential for them to be successful in all areas. Protection and…
Pentesting – What is this technique and how it works
Every organization manages information for its daily operation. It is common that tools are used for its treatment on computers,…
DNS Tunneling – A Data Encoder Attack Method
DNS Tunneling is a cyber attack method that encodes data from other programs or protocols into DNS queries and responses.…

