The History of Cybersecurity – and how it has evolved
Security has existed since the beginning of the history and its evolution has been linked in one way or another…
Vollgar – Malware that is launched with brute force
Since May 2018, a malware botnet call Vollgar has been launching brute force attacks against Microsoft SQL (MSSQL) databases to…
Which benefits does Hyperautomation gives to us?
Hyperautomation is a concept that has become more common every day since Gartner included it as one of the top…
What you should know about Crypto mining
Crypto mining is nothing more than cryptocurrency mining, but what is meant by cryptocurrency mining? In this context, mining is…
Ubuntu Cybersecurity – How good it is?
It is estimated that Ubuntu has the best cybersecurity but… how true is this? Ubuntu is the most secure operating…
WhatsApp changes in policy and privacy – It is safe?
As we all know, WhatsApp is a means of communication (the most used) by many people and this application has…
Red and Blue Team – what functions does they cover
The protection of technological systems and projects with tools that Cybersecurity experts dominate every day is more necessary for companies.…
The Case of Stefan Thomas and his Bitcoin issues
Just recently we talked about how important it is to secure your Bitcoins wallet, so the case of Stefan Thomas…
Diferences between Hackers and Crackers
The terms hackers and crackers have different meanings, since, while the first refers to the person capable of breaking into…

