
Jason Chavarría
A lesson of this global IT crash is to shift left
A defect in a CrowdStrike sensor update made 8.5M devices crash. We think this event shows the importance of testing security from early stages of development.

Felipe Ruiz
Chances are you're vulnerable with Microsoft Office
In this blog post, you can learn what Follina is, how it works, what cyberattacks are linked to it and what you can do as prevention measures.

Jason Chavarría
Buggy package managers, some only on Windows
Researchers found vulnerabilities in some versions of eight popular package managers. We review how an attacker could exploit them and urge everyone to upgrade.

Jason Chavarría
Emotet may be back for the crown as king of malware
Emotet reigned as the most dangerous malware before the shutdown of its servers earlier this year. Unfortunately, this month has seen its reappearance.

Felipe Ruiz
And apply the patches to avoid the PrintNightmare
You can read this post to learn about the nightmare that started to emerge within Windows months ago, which may affect many of its users, including you.

Andres Roldan
Local Privilege Escalation
In this article we will be able to perform a Local Privilege Escalation using an exploit to HEVD.

Andres Roldan
Bypassing OS protections
In this article we will defeat some protections using several techniques for exploiting HackSys Extremely Vulnerable Driver

Andres Roldan
How to crash Windows
This article will be the first approach to start exploiting HackSys Extremely Vulnerable Driver with a Denial of Service

Andres Roldan
Getting in the deeps of the OS
This post will guide you to setup a lab environment for start exploiting Windows Kernel drivers.