
Blog posted on 21/04/2022
This post presents some lines of action that should be followed to deal with a DrDoS cyberattack based on the SNMP protocol, describing in detail the prevention, identification and response phases to follow.

News posted on 19/04/2022

News posted on 05/04/2022

News posted on 04/04/2022

News posted on 29/03/2022

News posted on 28/03/2022

News posted on 15/03/2022

News posted on 14/03/2022

News posted on 28/02/2022

Blog posted on 24/02/2022
This post will analyse the vulnerabilities associated with Log4Shell, detected in the library Log4j, which is found in infinite software products both in technical and industrial fields. Although there have been other instances of more sophisticated vulnerabilities, the problem with this one is area of exposure.