Exploring the Hidden Attack Surface of OEM IoT devices live talk – English & Spanish

Pentesters use a comprehensive and complete toolkit to…


Reverse engineering and game hacking resources

Pentesters use a comprehensive and complete toolkit to…


Our CEO Federico Kirschbaum at Argentina Fintech Forum

Pentesters use a comprehensive and complete toolkit to…


Our team’s vulnerabilities disclosures 2022

Pentesters use a comprehensive and complete toolkit to…


Cybersecurity is a secondary objective, and that’s what we’ve been getting wrong.

A programmer is close to a deadline and must work fast. For…


Continuous testing, continuous security

We have a very diverse team with strengths in different…


Top 5 security tips: AWS Cloud Infrastructure

Pentesters use a comprehensive and complete toolkit to…


On the security of IoT devices

According to Cisco’s Annual Internet Report, nearly…


Password strength

Passwords are the first aspect of computer security we…


Securing open source software (Part 2)

Open-source software increases its presence in data…