Hacker

Effectively Securing Your Corporate Web Applications in 5 Steps

According to the latest Verizon Data Breach Investigations Report, cyber-attacks are on the rise. The cat-and-mouse game between hackers and defenders of corporate web...

The Rise of Artificial Intelligence in Cyber Security

Currently, the new trends in cyber security are the use of artificial intelligence (AI) and machine-learning to predict threats before they are even conceived....
Verizon DBIR 2016

Cyber-Threat: Just a buzz word or a real risk for your...

A sober reflection on the facts delivered by Verizon with their annual “2016 Data Breach Investigations Report (DBIR)” For the last few years, we read...
Banking Trojan Illustration

Banking Trojans – An Immortal Enemy

A few years ago, the best way for a criminal to prepare for retirement was to rob a bank by physically breaking in or...
Turning Point

Turning Point – Is Your Company Safe?

In today’s world, more and more companies are relying on cheap security services, lured by the low prices offered to them. In parallel with...

PwnTillDawn, wizlynx group’s Computer Hacking Contest in Mexico City

Pwn Till Dawn is a computer hacking contest organized by wizlynx group, which is 100% oriented offensive security, and which will be...

PwnTillDawn Mexico 2019

On the 6th of April 2019, wizlynx group hosted its first computer hacking competition, PwnTillDawn in Mexico City. Part capture the flag...
crest

WLX is now CREST accredited Penetration Testing Provider GLOBALLY!

Based on the great success of wizlynx group in the Asia Pacific region providing CREST accredited penetration testing services, we decided to extend our...
Ransomware illustration

Your Data Can Be Kidnapped Too… Ransomware in Action

According to Wikipedia “Ransom is the practice of holding a prisoner or item to extort money or property to secure their release, or it...
IoT Fridge illustration

Can a Refrigerator Compromise the Security of Your Company?

The internet has been invented for a while now. It connected people, images, recording, games, books, and commerce. By people, for people. With the...
- Advertisement -
Ethical Hacking and Penetration Testing

Recent Posts