
Felipe Ruiz
Let's rather say a bunch of breaches in a single box
They said they discovered the mother of all data breaches. But it was a false alarm. Let's understand why.

Jason Chavarría
Among exposed were secrets, code and AI training data
We describe the leak and mention its causes and threats, talk about the possible security risks when using Azure SAS tokens and give advice to prevent leaks.

Jason Chavarría
Toyota's ancient and recently disclosed data leaks
We describe the data leaks recently disclosed by Toyota Motor Corporation lasting five, eight and ten years.

Felipe Ruiz
Watch out for keylogging/keyloggers
Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.

Felipe Ruiz
Benefits and risks of these increasingly used programs
We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.

Felipe Ruiz
And round it off with our Secure Code Review
Check out some best practices for secure coding your developers can start applying and how our Secure Code Review can complement them.

Jason Chavarría
How does this clever Linux Trojan operate?
Reportedly, the last six months have seen a 254% surge in this Linux Trojan's activity. Read this post to learn what it is and what should be done about it.

Jason Chavarría
Insider attack suspect was arrested this month
An individual was arrested for extorting Ubiquiti, the company where he worked as a developer. In this post, we narrate the key points of his attack.

Jason Chavarría
Here's what happened this year, in case you missed it
Supply chain attacks, ransomware and data leaks: We give you a short summary of the major cyberattacks of 2021.