Digital Transformation
The example of digital transformation studied by Digitalya, and available on their blog (see link below) is...
PwnTillDawn Mexico 2019
On the 6th of April 2019, wizlynx group hosted its first computer hacking competition, PwnTillDawn in Mexico City. Part capture the flag...
PwnTillDawn, wizlynx group’s Computer Hacking Contest in Mexico City
Pwn Till Dawn is a computer hacking contest organized by wizlynx group, which is 100% oriented offensive security, and which will be...
WLX is now CREST accredited Penetration Testing Provider GLOBALLY!
Based on the great success of wizlynx group in the Asia Pacific region providing CREST accredited penetration testing services, we decided to extend our...
The Rise of Artificial Intelligence in Cyber Security
Currently, the new trends in cyber security are the use of artificial intelligence (AI) and machine-learning to predict threats before they are even conceived....
Web Apps: A Great Target For Cyber Criminals
Web Applications are everywhere, and are in most cases a core component for companies. They are used for various reasons and very often capture,...
Effectively Securing Your Corporate Web Applications in 5 Steps
According to the latest Verizon Data Breach Investigations Report, cyber-attacks are on the rise. The cat-and-mouse game between hackers and defenders of corporate web...
Dark Web – Use It At Your Own Advantage!
The Dark Web is a very mysterious place and very difficult to access…Nah - just kidding! Today’s media outlets are perhaps giving that impression,...
Turning Point – Is Your Company Safe?
In today’s world, more and more companies are relying on cheap security services, lured by the low prices offered to them. In parallel with...
Cyber-Threat: Just a buzz word or a real risk for your...
A sober reflection on the facts delivered by Verizon with their annual “2016 Data Breach Investigations Report (DBIR)”
For the last few years, we read...