Imagen decorativa Avisos
Blog publicado el 11/05/2023

En este artículo se presentarán algunas soluciones útiles en la realización de test de vulnerabilidades en aplicaciones Android, resaltando las oportunidades que estas tareas aportan a la ciberseguridad.

Imagen decorativa Avisos
Blog publicado el 02/03/2023

Knowing the resources available when performing tasks of hardening a system, will allow us to optimize the time necessary to obtain a safer system. In addition, we have the possibility of using tools capable of auditing the system that identifies those configurations that are considered safe and which ones we could implement.

Imagen decorativa Noticia
Noticia publicada el 15/03/2022
Imagen decorativa Avisos
Blog publicado el 24/02/2022

This post will analyse the vulnerabilities associated with Log4Shell, detected in the library Log4j, which is found in infinite software products both in technical and industrial fields. Although there have been other instances of more sophisticated vulnerabilities, the problem with this one is area of exposure.

Imagen decorativa Avisos
Blog publicado el 05/07/2021

Anatsa is a banking Trojan designed for Android devices that has become particularly relevant since its discovery in January 2021. Throughout the study, a detailed technical analysis of the threat is carried out using a sample of the malicious code in question to show how this malware behaves and the possibilities it offers.

Imagen decorativa Noticia
Noticia publicada el 16/04/2021
Imagen decorativa Avisos
Blog publicado el 15/04/2021

Various studies with threat analysis or malware distribution campaigns affecting Spain and identified through incident management undertaken by INCIBE-CERT. The aim is to increase knowledge of the more technical details and characteristics of the threats so that organisations can implement appropriate detection and protection measures.

Imagen decorativa Noticia
Noticia publicada el 22/05/2020