Skip to content
Cristian Thous – Ciberseguridad al alcance de todos
Ciberseguridad al alcance de todos
Cristian Thous - Ciberseguridad al alcance de todosCristian Thous - Ciberseguridad al alcance de todos
  • Home
  • News
  • Hacking
    • Methods of attack
    • Prevention methods
    • Connectivity methods
    • Windows hacking
    • Linux hacking
  • Research
  • Contact
  • Español
  • English
Search:
Instagram page opens in new windowFacebook page opens in new windowTelegram page opens in new window
  • Home
  • News
  • Hacking
    • Methods of attack
    • Prevention methods
    • Connectivity methods
    • Windows hacking
    • Linux hacking
  • Research
  • Contact
  • Español
  • English

Yearly Archives: 2025

You are here:
  1. Home
  2. 2025

Photoreal cover: digital shield over city and small store; IoT devices and ransomware alert.

Cibersecurity In 2025: Top Threats, Real Risks And Business Impact

Prevention methodsBy n8nAugust 27, 2025

Explore the evolving Cibersecurity landscape of 2025 to understand which threats—ransomware, supply-chain compromises, AI-assisted attacks and insecure IoT—pose the greatest business risks. This authoritative guide provides clear priorities, quick mitigation steps and a practical decision framework to protect operations, data and reputation. Read more to act now.

Split image: legacy VPN cable vs modern Zero Trust cloud and segmented secure network

Why Zero Trust Network Access (ZTNA) Replaces VPNs: Architecture, Security, and Operational Gains

Connectivity methodsBy n8nAugust 27, 2025

This technical playbook explains why Zero Trust Network Access (ZTNA) is the practical successor to legacy VPNs. Learn the architecture, core controls, SASE integration, and a phased migration plan to reduce attack surface, simplify operations, and improve security posture. Read on for actionable guidance to plan a safe, measurable ZTNA transition.

SIM-based authentication will put an end to phishing

ResearchBy Cristian SantanaAugust 2, 2025Leave a comment

Let’s face it: we all use email, and we all use passwords. Passwords create an inherent vulnerability in the system. The success rate of phishing attacks is skyrocketing, and opportunities for attack have multiplied enormously as life has moved online. All it takes is one compromised password for all other users to fall victim to…

Remote Desktop Protocol (RDP)

Connectivity methods, Hacking ENBy Cristian SantanaJuly 17, 2025Leave a comment

Remote Desktop Protocol (RDP) is a protocol, or technical standard, for using a desktop computer remotely. Remote desktop software can use several different protocols, including RDP, Independent Computing Architecture (ICA), and Virtual Network Computing (VNC), but RDP is the most widely used protocol. RDP was initially released by Microsoft and is available for most Windows…

How to protect the Linux Kernel

Prevention methodsBy Cristian SantanaJune 12, 2025Leave a comment

With the support of the open-source community and a strict privilege system built into its architecture, Linux has security built into its design. That said, gone are the days when Linux system administrators could get away with poor security practices. Cybercriminals have come to view Linux as a viable attack target due to its growing…

Kerberos: Implementation, Analysis, and Exploitation

Hacking EN, Methods of attack, ResearchBy cristhousJune 2, 2025Leave a comment

What is Kerberos? Kerberos is a secure network authentication protocol based on tickets, designed to allow users and services to mutually authenticate over an untrusted network. Its main goal is to ensure that a user’s identity can be verified without transmitting passwords over the network, thereby reducing the risk of interception. Originally developed at MIT…

Attack methods: Content Spoofing

Hacking EN, Methods of attackBy Cristian SantanaMay 27, 2025Leave a comment

Content spoofing (also known as content injection) is one of the most common web security vulnerabilities. It allows the end user of the vulnerable web application to falsify or modify the actual content of the web page. Requirements: Responsibility: In this tutorial, we will use hacking techniques for educational purposes only. We do not promote…

Attack methods: CSV injection

Hacking EN, Methods of attackBy Cristian SantanaMay 1, 2025Leave a comment

Online attacks are more frequent than ever, and this trend is likely to continue growing. In this article, we analyze CSV injection attacks and how to defend against them. Requirements: Responsibility: In this tutorial, we will use hacking techniques for educational purposes only. We do not promote their use for profit or improper purposes. We…

How to dump the SMBShare

Hacking EN, Windows hacking ENBy Cristian SantanaApril 9, 2025Leave a comment

A script to remotely dump files and folders from a Windows SMB share Requirements: Responsibility: In this tutorial, we will use hacking techniques for educational purposes only. We do not promote their use for profit or improper purposes. We are not responsible for any damage or impairment that may be caused to the systems used.…

Attack methods: Cross-origin resource sharing (CORS)

Hacking EN, Methods of attackBy cristhousMarch 12, 2025Leave a comment

In this section, we will explain what Cross-Origin Resource Sharing (CORS) is, describe some common examples of attacks based on Cross-Origin Resource Sharing, and discuss how to protect against these attacks. Requirements: Responsibility: In this tutorial, we will use hacking techniques for educational purposes only. We do not promote their use for profit or improper…

←1
23456789
…1011121314→
Cristian Thous - Ciberseguridad al alcance de todos
Pagina creada por Unic Services
Go to Top
Utilizamos cookies en nuestro sitio web para ofrecerle la experiencia más relevante al recordar sus preferencias y visitas repetidas. Al hacer clic en "Aceptar", consiente el uso de TODAS las cookies.
Configuración de las cookiesAceptar
Manage consent

Resumen de la privacidad

Este sitio web utiliza cookies para mejorar su experiencia mientras navega por el sitio web. De ellas, las cookies clasificadas como necesarias se almacenan en su navegador, ya que son esenciales para el funcionamiento de las funciones básicas del sitio web. También utilizamos cookies de terceros que nos ayudan a analizar y comprender cómo utiliza usted este sitio web. Estas cookies se almacenan en su navegador sólo con su consentimiento. También tiene la opción de excluirse de estas cookies. Pero la exclusión de algunas de estas cookies puede afectar a su experiencia de navegación.
Necesario
SAVE & ACCEPT