Privacy Rules Podcast Cover 2

How does Cyber Threat Intelligence relates to data privacy and data...

Your digital identity and Personally Identifiable Information can be used by malicious actors for a variety of purposes. Let’s...
IoT Fridge illustration

Can a Refrigerator Compromise the Security of Your Company?

The internet has been invented for a while now. It connected people, images, recording, games, books, and commerce. By people, for people. With the...
PwnTillDawn New Events Announcement

PwnTillDawn, The Penetration Testing CTF Events for 2022

wizlynx group is thrilled to announce that PwnTillDawn will be back very soon hosting a new CTF...
PwnTillDawn Online Battlefield New Features Announcement

PwnTillDawn Online Battlefield – New Features and Improvements

Our CTF style Penetration Testing lab, PwnTillDawn Online Battlefield just got some awesome new features and improvements we are sure you will...
Turning Point

Turning Point – Is Your Company Safe?

In today’s world, more and more companies are relying on cheap security services, lured by the low prices offered to them. In parallel with...
Hacker illustration

Effectively Securing Your Corporate Web Applications in 5 Steps

According to the latest Verizon Data Breach Investigations Report, cyber-attacks are on the rise. The cat-and-mouse game between hackers and defenders of corporate web...
PwnTillDawn Mexico Competition - Logo

PwnTillDawn Mexico 2019

On the 6th of April 2019, wizlynx group hosted its first computer hacking competition, PwnTillDawn in Mexico City. Part capture the flag...
Verizon DBIR 2016

Cyber-Threat: Just a buzz word or a real risk for your...

A sober reflection on the facts delivered by Verizon with their annual “2016 Data Breach Investigations Report (DBIR)” For the last few years, we read...
Phishing Illustration

Social Engineering & Email Phishing – The 21st Century’s #1 Attack?

Together with your internet-facing web apps, you are undeniably the #1 target of a cyber attacker to either break...
Digital Transformation illustration

Digital Transformation

The example of digital transformation studied by Digitalya, and available on their blog (see link below) is...
- Advertisement -
Ethical Hacking and Penetration Testing

Recent Posts