Source code review: your company’s security first.

Source code review

Source code review is a tool that can really save you from a lot of things, read on and find out the benefits it has for your company. If we review many of the statistics on cybersecurity that we get on the Internet, we can realize that many of the attacks are aimed at web […]

Read more

Stronger security: authentication beyond passwords.

Stronger security

Stronger security is always necessary, and sometimes the classic password is not enough. But fear not, other methods will help you a lot. Access to a company’s devices and user accounts should ideally involve the highest possible security level, at least stronger security than access to a public forum on the web requires. Strong and […]

Read more

The largest data breaches of the century.

data breaches

Data is precious in this information age. Therefore, some steal it. Read on and find out the most significant data breaches of this century. Data is one of the most valuable assets of any company. So we live in a world where there are many benefits, including economic benefits, to be gained from information. The […]

Read more

The Stolen Identity modern issue. What can cybersecurity do?

Stolen Identity

Internet and information. The more we expose ourselves, the more information can be taken from us. Beware of stolen identity. The advent of the Internet has been a phenomenon of great importance for mankind; being one of the most useful tools we have at our disposal. Therefore its use allows us to share a large […]

Read more

Your company was hacked, do you know what to do?


When your company suffers an attack a lot of things happen. So get informed about what you should and shouldn’t do when your company is hacked. Previously we have talked in this blog about cybersecurity, different attacks made to several companies, methods to keep you safe, among other topics; however, it is time to talk […]

Read more

Silver Sparrow has infected almost 300k Mac devices.

Silver Sparrow

Once again a silent malware has reminded us that nothing is impenetrable – find out about the Silver Sparrow attack on almost 300k Mac devices! Since its debut, the Apple Company has always been recognized for being one of the strongest technology companies in the world market; with approximately 1.7 billion devices sold worldwide, we […]

Read more

Vulnerability assessment: another good solution?

Vulnerability assessment

Every organization or company is susceptible to cyber-attacks, and a good vulnerability assessment would make your infrastructure more secure. The vulnerability assessment consists of an automatic analysis designed to identify, classify and prioritize possible vulnerabilities in the IT systems of an organization or company. These assessments are carried out using standard scanning systems that will […]

Read more

Konferenco 2022, the Monero conference comes to Lisbon.


The Monero conference (Konferenco) arrives in Lisbon this 2022, people from all over the world united by the same interest meet in the same place. In the world of technology, we can find a lot of people whose mission is to inform about hundreds and hundreds of topics. In this case the monero conference (Konferenco) […]

Read more

The botnet, a network of threats and concerns.


A botnet is one of the cyber threats you should beware of. Your device may be part of this malicious network, and you need to resolve it quickly. The 21st century is undoubtedly the century of technological advances. Year after year, technology evolves at a dizzying pace that would surprise past generations. This is especially […]

Read more

The healthcare system at risk. A challenge for IT security.

healthcare system

Risks in the healthcare system have increased since the pandemic and are estimated to be even higher by 2022. Find out why the healthcare system is at risk. Cyber attackers are always on the lookout for new methods of attack. Since the start of the pandemic in 2020, hackers have taken advantage of this global […]

Read more