Skip to content
Cristian Thous – Ciberseguridad al alcance de todos
Ciberseguridad al alcance de todos
Cristian Thous - Ciberseguridad al alcance de todosCristian Thous - Ciberseguridad al alcance de todos
  • Home
  • News
  • Hacking
    • Methods of attack
    • Prevention methods
    • Connectivity methods
    • Windows hacking
    • Linux hacking
  • Research
  • Contact
  • Español
  • English
Search:
Instagram page opens in new windowFacebook page opens in new windowTelegram page opens in new window
  • Home
  • News
  • Hacking
    • Methods of attack
    • Prevention methods
    • Connectivity methods
    • Windows hacking
    • Linux hacking
  • Research
  • Contact
  • Español
  • English

Tag Archives: cybersecurity

You are here:
  1. Home
  2. Entries tagged with "cybersecurity"

Attack methods: Clickjacking

Hacking EN, Methods of attackBy Cristian SantanaNovember 20, 2023Leave a comment

Clickjacking is an attack that tricks the user into clicking on a web page element that is invisible or disguised as another element. This can cause users to unintentionally download malware, visit malicious web pages, provide credentials or sensitive information, transfer money or purchase products online. Requirements: Responsibility: In this tutorial we will use hacking…

How to stop a DDoS attack?

Hacking EN, Prevention methodsBy Cristian SantanaNovember 14, 2023Leave a comment

Imagine your website is a store, Distributed Denial of Service (DDoS) is like a mob in front of your store that won’t let your customers in. It’s a nasty situation to have tens of thousands of fake shoppers eating up your valuable resources, all at once. Know how to stop DDoS attacks. DDoS has become…

AS2 protocol and differences with SFTP

Connectivity methods, Hacking ENBy Cristian SantanaOctober 18, 2023Leave a comment

How are sensitive sectors such as commercial airlines, healthcare or transport communicated and shared data? How do you transfer structured B2B data safely and reliably through risk networks like the Internet? The answer is the AS2 protocol. What is AS2? Applicability Statement 2 ( AS2 ) is a type of file transfer mechanism based on…

Methods of attack: Brute Force Attack

Hacking EN, Methods of attackBy Cristian SantanaOctober 17, 2023Leave a comment

What is the brute force attack method? A brute force attack uses the trial and error method to guess access information, encryption keys, or find a hidden web page. Hackers work through all possible combinations in hopes of guessing correctly. These attacks are carried out by « brute force », which means that they use…

What is an EDR? Why is it different from an antivirus?

Prevention methodsBy Cristian SantanaSeptember 14, 2023Leave a comment

In a world where cyber threats change and evolve at practically the same speed as technology itself, security solutions are needed that not only react to the threat, but are able to anticipate it. Within those proactive solutions we have the EDR system; In this article we explain what it is, how it works and how…

SSH What is it? ¿How does it work?

Connectivity methodsBy Cristian SantanaSeptember 14, 2023Leave a comment

SSH or Secure Shell, is a remote administration protocol that allows users to control and modify their remote servers over the Internet through an authentication mechanism. Provides a mechanism to authenticate a remote user, transfer entries from the client to the host, and retransmit the output back to the client. The service was created as…

Attack methods: Cache Poisoning

Methods of attackBy Cristian SantanaApril 12, 2023Leave a comment

Imagine that, as a high school senior prank, the high school students change all the room numbers in the high school facilities, so that new students who don’t know the high school floor plan yet will spend the next day lost and going to the wrong classes. Now imagine that mismatched room numbers get recorded in…

Top 10 Cybersecurity Trends for 2023: From Zero Trust to Cyber Insurance

NewsBy Cristian SantanaApril 10, 20231 Comment

As technology advances, cyberattacks are becoming more sophisticated. With the increasing use of technology in our daily lives, cybercrime is on the rise, as evidenced by the fact that cyberattacks caused 92% of all data breaches in the first quarter of 2022. Staying current with cybersecurity trends and laws is crucial to combat these threats, which can…

←12←
Cristian Thous - Ciberseguridad al alcance de todos
Pagina creada por Unic Services
Go to Top
Utilizamos cookies en nuestro sitio web para ofrecerle la experiencia más relevante al recordar sus preferencias y visitas repetidas. Al hacer clic en "Aceptar", consiente el uso de TODAS las cookies.
Configuración de las cookiesAceptar
Manage consent

Resumen de la privacidad

Este sitio web utiliza cookies para mejorar su experiencia mientras navega por el sitio web. De ellas, las cookies clasificadas como necesarias se almacenan en su navegador, ya que son esenciales para el funcionamiento de las funciones básicas del sitio web. También utilizamos cookies de terceros que nos ayudan a analizar y comprender cómo utiliza usted este sitio web. Estas cookies se almacenan en su navegador sólo con su consentimiento. También tiene la opción de excluirse de estas cookies. Pero la exclusión de algunas de estas cookies puede afectar a su experiencia de navegación.
Necesario
SAVE & ACCEPT