PwnTillDawn New Events Announcement

PwnTillDawn, The Penetration Testing CTF Events for 2022

wizlynx group is thrilled to announce that PwnTillDawn will be back very soon hosting a new CTF...
Turning Point

Turning Point – Is Your Company Safe?

In today’s world, more and more companies are relying on cheap security services, lured by the low prices offered to them. In parallel with...
PwnTillDawn Online Battlefield New Features Announcement

PwnTillDawn Online Battlefield – New Features and Improvements

Our CTF style Penetration Testing lab, PwnTillDawn Online Battlefield just got some awesome new features and improvements we are sure you will...
Ransomware illustration

Your Data Can Be Kidnapped Too… Ransomware in Action

According to Wikipedia “Ransom is the practice of holding a prisoner or item to extort money or property to secure their release, or it...
web app threats and vulnerabilities illustration

Web Apps: A Great Target For Cyber Criminals

Web Applications are everywhere, and are in most cases a core component for companies. They are used for various reasons and very often capture,...
Industrial factory machinery represents the interconnected nature of IoT systems in manufacturing. Learn about IoT risks and cybersecurity solutions with insights from wizlynx group.

IoT’s Growing Risks: How to Shield Your Devices from Vulnerabilities

The Internet of Things, commonly known as IoT, has emerged as a transformative force. It brings convenience and efficiency to our daily...
PwnTillDawn Mexico Competition - Logo

PwnTillDawn Mexico 2019

On the 6th of April 2019, wizlynx group hosted its first computer hacking competition, PwnTillDawn in Mexico City. Part capture the flag...
zero-day exploits

Zero-Day Exploits: What You Need to Know

Imagine you're an avid gamer, eagerly awaiting a new game, only to realize you have the ultimate weapon already equipped from the...

The Anatomy of Cyber Extortion: Unmasking its Nitty-Gritty Details

Cyber extortion it's a concerning practice that involves cybercriminals resorting to blackmail. Moreover, this criminal activity has become increasingly prevalent in recent...

Unveiling the Costs of Cybersecurity Assessments: What You Need to Know

Every business with a digital presence has questioned the sustainability and cost-effectiveness of protecting its online assets at least once. But first,...
- Advertisement -
Ethical Hacking and Penetration Testing

Recent Posts