
Wendy Rodriguez
Users put their trust in you; they must be protected
Ensuring secure online transactions is crucial to build a loyal bond with users. Discover the potential threats and learn how to protect user data effectively.

Wendy Rodriguez
Is your financial service as secure as you think?
Organizations providing financial services are prime targets for cybercrime. Learn why, which threats lurk, and how we can help.

Felipe Ruiz
We need you, but we can't give you any money
We want to persist in raising awareness about the scarce support that many open-source software projects, on which nearly everyone depends, are receiving.

Felipe Ruiz
A digital infrastructure issue that many still ignore
The joke mentioned here is just a small sample of a big dependency issue in the global digital infrastructure, about which we need to raise awareness.

Felipe Ruiz
Let's rather say a bunch of breaches in a single box
They said they discovered the mother of all data breaches. But it was a false alarm. Let's understand why.

Jason Chavarría
Boeing, 60 credit unions, and more, have been impacted
The U.S. has been a major focus of ransomware attacks leveraging the Citrix Bleed vulnerability. We tell you about recent exploits involving this security flaw.

Carlos Bello
Beware of insecure-by-default libraries!
Here we present in detail a vulnerability we discovered in BookStack v23.10.2, along with the steps to follow to replicate the exploit.

Carlos Bello
What is invisible to some hackers is visible to others
Here we present in detail a vulnerability we discovered in PaperCut MF/NG v22.0.10, along with the steps to follow to replicate the exploit.

Felipe Ruiz
Benefits and risks of these increasingly used programs
We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.