Anti-virus or EDR? understanding the differences and their advantages
Protecting your company with an antivirus or an EDR? Not a trivial question. Faced with the... Read more

Protecting your company with an antivirus or an EDR? Not a trivial question. Faced with the... Read more
The need for cybersecurity in business has become a reality regardless of the size of the... Read more
Taking a break from the office? Lucky you... but cybercriminals don't! Cybercrime continues to escalate. During... Read more
Paralyzed communities, blocked administrations, threatened hospitals, these headlines are unfortunately in the news. Cyber attacks in... Read more
Spain targeted by BRATA? The malware is back in the spotlight, and is growing to the... Read more
Network Traffic Analysis (NTA), Network Detection and Response (NDR) or Network Analysis and Visibility (NAV) was... Read more
Given the excitement around insurance in the cyber ecosystem, we decided to devote an article. It... Read more
Phishing is a common type of social engineering attack. According to a Proofpoint survey, "83% of... Read more
Haven't you ever quickly typed your favorite website on your computer, or with your supersonic fingers... Read more
Only 17% of SMBs (1) rate their cybersecurity capabilities as ‘effective’ or ‘somewhat effective’. And a... Read more
If you are a SMB owner trying to strengthen your cybersecurity quickly but, most importantly, efficiently,... Read more
RustyStealerDropper Use case A reminder: what are malware droppers?How do they stay in your systems?Deobfuscating a... Read more