close
14 Apr 2020

Analísis de la necesidad de registrar eventos de PowerShell.

Amedida que continuamos desarrollando CyberEasy, nuestro equipo de ing...

13 Apr 2020

The need for PowerShell logging and further analysis.

As we continue to develop CyberEasy, our engineering team added a lot ...

25 Mar 2020
Phishing Vulnerability | 3 min read

COVID-19 y estafas

COVID-19 es uno de los temas más importantes en todo el mundo en este ...

24 Mar 2020
Vulnerability | 2 min read

COVID-19 and scams

COVID-19 is one of the most important topics around the world right no...

19 Mar 2020

Nuestros Consejos de Ciberseguridad para el Teletrabajo

En estos tiempos, las circunstancias nos han obligado a tomar medidas ...

11 Mar 2020
Threat report | 1 min read

Intel processors – Another flaw but no patch available this time.

Researchers have discovered a new vulnerability that affects Intel pro...

11 Mar 2020
| 4 min read

CyberEasy 2.0 is here!

So, what's new in CyberEasy? Basically, everything! Our extensive team...

24 Feb 2020

Emotet - What is it and How to protect yourself from it.

What is it? Emotet is a malware (Malicious Software) from the Trojan f...

07 Feb 2020

Flaw in WhatsApp – A backdoor to hack your computer

A group of researchers has found several security flaws in WhatsApp th...

24 Jan 2020
Threat report | 3 min read

Ryuk ransomware - It switches on your computer.

You probably think that when a computer is turned off nothing terrible...

Let Us Know What You Thought about this Post.

Put your Comment Below.