
Felipe Ruiz
Watch out for keylogging/keyloggers
Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.

Jason Chavarría
Pentesting is a system-agnostic approach to security
The types of penetration testing include external and internal network, wireless, IoT, mobile application and social engineering pentesting. Learn more here.

Felipe Ruiz
Chances are you're vulnerable with Microsoft Office
In this blog post, you can learn what Follina is, how it works, what cyberattacks are linked to it and what you can do as prevention measures.

Jason Chavarría
Buggy package managers, some only on Windows
Researchers found vulnerabilities in some versions of eight popular package managers. We review how an attacker could exploit them and urge everyone to upgrade.

Felipe Ruiz
Highlights since just before the Russian invasion
This blog post provides you with a timeline of some cybersecurity highlights since shortly before Russia invaded Ukraine up to this point.

Jason Chavarría
Emotet may be back for the crown as king of malware
Emotet reigned as the most dangerous malware before the shutdown of its servers earlier this year. Unfortunately, this month has seen its reappearance.

Jason Chavarría
Employees as the strongest link in the security chain
The human-as-a-security-sensor paradigm asserts that catastrophe can be prevented if employees are trained to report threat events promptly. Learn more here.

Jason Chavarría
Android devices are catching FluBot and TangleBot
Read this post to learn about two Android malware campaigns. FluBot fools its victims using clever lures and TangleBot can be used to spy on the victims.

Jason Chavarría
Discover social engineers' weapons of influence
Read this post to learn the psychological tactics used in cyberattacks and what personality traits make targets more (or less) susceptible to fall for them.