Cookieness: Bypass Stack Canaries using Format String Vulnerabilities
In this article, the exploitation of a vulnerable binary is carried out, using a CTF (Capture The Flag) challenge designed specifically for this purpose. “Cookieness” is a challenge of the pwn category or binary exploitation that consists of reading a file called “flag.txt” through a format string vulnerability and a stack buffer overflow on a […]
Quantum cryptography and its impact on our cybersecurity
As an introduction to quantum cryptography, we begin by defining cryptography in security applied to protect information, both of users, their personal and private information, as well as that of companies and governments. To do so, we rely on ensuring confidentiality, integrity and authenticity. Confidentiality is ensured by encrypting communications from one point to another […]
DORA, the regulation that seeks digital operational resilience for the financial sector
On January 16, 2023, the Digital Operational Resilience Regulation, “DORA“, came into force. For the first time, provisions addressing digital risk in finance are brought together in a coherent manner and in a single piece of legislation. What is the Digital Operational Resilience Regulation (DORA)? The Digital Operational Resilience Regulation solves a major problem […]
Cipherbit
about us Cipherbit Cipherbit Cipherbit is the first Spanish brand to combine communications encryption and cybersecurity. Cipherbit is formed by a team of 140 specialists specifically dedicated to the development of secure communications (encryption) products (hardware and software) and the development of cybersecurity services and solutions. Our solutions meet the highest security requirements of the […]
Cybersecurity, keys to the digital transformation of companies and public administrations
Digital event on #Cybersecurity organized by the newspaper Portfolio y Uniandinos – Official to inform and guide companies and public administrations in the management and prevention of the risks involved in the acceleration of their digital transformation.
Cybersecurity and New Developments at the First National Security Scheme Meeting
Almost 10 years of the National Security Scheme and we ask ourselves, what is the state of Spanish public administrations in terms of security? On June 18, 2019, was held in the Auditorium of the Fábrica Nacional de la Moneda y Timbre the “I National Security Scheme Meeting“organized by the National Cryptologic Center (CCN), the […]
FORSETI
cybersecurity and encryption FORSETI Cybersecurity and Encryption COMPLIANCE WITH APPLICABLE REGULATIONS ON MANDATORY SECURITY AND PRIVACY REQUIREMENTS Comprehensive management to cover the adequacy and maintenance of cybersecurity regulations. FORSETI is the comprehensive solution that consolidates and improves security requirements to comply with the RGPD and the National Security Scheme. simulate cyber attack Thanks to a […]
RAGNAROK
cybersecurity and encryption RAGNAROK Ethical Hacking Cybersecurity and Encryption TO UNLEASH THE STORM, TO LEARN TO LIVE IN THE RAIN The solution that tests the security of your systems and the real strength of your business against a cyber attack. Ragnarok is the strategic solution to know the real situation of your cybersecurity systems and […]
PDSI
cybersecurity and encryption ISDP Cybersecurity and Encryption THE SECURITY PLAN, AN INDISPENSABLE ALLY OF THE ORGANIZATIONAL STRATEGY The best way to efficiently manage cybersecurity to achieve your organizational goals. The ISDP allows determining short, medium and long term cybersecurity objectives and decisions to ensure optimal security management. simulate cyber attack Your Strategy 360° Security For […]
NORNAS
cybersecurity and encryption NORNAS Cybersecurity and Encryption ENSURES BUSINESS SURVIVAL THROUGH BUSINESS CONTINUITY MANAGEMENT Comprehensive solution to ensure fast and effective response to business interruptions NORNAS is the end-to-end solution that ensures that the company continues to deliver its products or services, at an acceptable and predefined level, after a disruptive incident. simulate cyber attack […]
Industrial
cybersecurity Industrial IT and OT Network Security Cybersecurity SECURITY IN INDUSTRIAL CONTROL SYSTEMS Fundamental pillar for ensuring business continuity in industrial environments simulate cyber attack OT MONITORING SERVICE SMARTSOC IS A 24X7X365 SECURITY AND MONITORING OPERATIONS CENTER. Monitoring 24x7x365 monitoring service of your organization’s industrial assets by cyber experts. Detection Timely management of new threats, […]