September 11, 2025
Content-Security Policy (CSP) y cómo (no) confiar ciegamente en ella
El Content-Security Policy (CSP) es una de las defensas más…
August 28, 2025
COD4MW Cheat: A Reverse Engineering Adventure
If you enjoy playing online games, you’ve probably heard…
May 27, 2025
Automation and Pentesting: Use AI and Open-Source Tools
This article aims to combine automation and pentesting…
March 25, 2025
Car Hacking: How to unlock doors with Doggie
This post will explore a practical use case to demonstrate…
January 7, 2025
CVSS v4: What’s New and Why It Matters for Your Vulnerability Management
In the ever-evolving landscape of cybersecurity, staying…
October 30, 2024
Back to basics: Security recommendations for your team
October is Cybersecurity Awareness Month, a time when we…
July 17, 2024
Using Faraday API for Vulnerability Management
Within our team, we prefer to focus on specific tasks…
December 7, 2023
First steps in cybersecurity: scan your domain
Pentesters use a comprehensive and complete toolkit to…
November 27, 2023
Visualize findings and understand your security posture
Our risk scoring system goes beyond mere criticality…