
Jason Chavarría
An interview with members of our hacking team
Members of our hacking team who took part in the International Cybersecurity Challenge tell us what the hardest part was, their recommendations, and more.

Carlos Bello
What is invisible to some hackers is visible to others
Here we present in detail a vulnerability we discovered in PaperCut MF/NG v22.0.10, along with the steps to follow to replicate the exploit.

Felipe Ruiz
Watch out for keylogging/keyloggers
Here we spell out what keylogging is and what keyloggers are, as well as how you can prevent, identify and remove them.

Felipe Ruiz
Benefits and risks of these increasingly used programs
We describe the password managers, their advantages and disadvantages, some recent security incidents, and give you some recommendations on their use.

Felipe Ruiz
Description and critique of CEH certifications
Here's a description and a critique of the CEH founded on the question, "Should the person who has this certification be called a 'certified ethical hacker'?"

Jason Chavarría
Or what makes the ethical hacker
If ethical hackers can do everything cybercriminals do, what is keeping them from wrongdoing? Let's see how they differ and how that shows in codes of ethics.

Jason Chavarría
O lo que hace al hacker ético
Si los hackers éticos pueden hacer todo lo que hacen los ciberdelincuentes, ¿qué les impide obrar mal? Veamos en qué se diferencian y cómo eso se manifiesta en los códigos de ética.

Felipe Ruiz
Recognize the value of this security assessment method
We took as a basis a question from Tribe of Hackers Red Team (2019) aimed at explaining the value of red teaming to those who're reluctant or unaware of it.

Felipe Ruiz
Tips for choosing a vulnerability management solution
If you are still wondering what you should pay more attention to when choosing a vulnerability management solution, we recommend you read this blog post.