Young hacker smiling

Zero false positives

Expert intelligence + effective automation

Executive leaking business information

Attacking Without Announce

Nobody knows, but everything is allowed

We talk a lot about the advantages of extreme connectivity and availability of information, but so little about how our company’s, client’s, or even our own personal data is secure. Here we want to guide you about some management policies we suggest that you could take in advance …



Hands typing in a text editor

The importance of pentesting

Protect your company against Hackers, not Lamers

Without a doubt, the recent events in relation to the infringement of privacy, such as the theft of personal information from celebrities, the Sony, Target and Equifax hacks, and the big ransomware that affected Telefonica, make us reflect about how organizations protect their information. All of this in addition to …



several balloons floating in the air

Healthcare in the clouds

Cloud based systems in healthcare and their issues

The healthcare nowadays is in the clouds, and not just the prices. With the fast pace in which technology advances and the many different solutions that are offered to all types of users, enterprises across all sectors are either in the cloud, transitioning to the cloud, or thinking about making …



Computer with four padlocks, one unlocked

Dude, where’s my XSS protection?

Solving Halls of Valhalla Challenge: XSS4

Web application security is a major concern nowadays. You have to make sure your application is secure, especially if you have a lot of users. There are many controls a developer can implement to attempt to make the site safer. Or so they think. The fun of hacking is looking …



Service status - Terms of Use