Digital Transformation

The example of digital transformation studied by Digitalya, and available on their blog (see link below) is...

Web Apps: A Great Target For Cyber Criminals

Web Applications are everywhere, and are in most cases a core component for companies. They are used for various reasons and very often capture,...

Social Engineering & Email Phishing – The 21st Century’s #1 Attack?

Together with your internet-facing web apps, you are undeniably the #1 target of a cyber attacker to either break...
wizlynx CTI - Dark Web

Dark Web – Use It At Your Own Advantage!

The Dark Web is a very mysterious place and very difficult to access…Nah - just kidding! Today’s media outlets are perhaps giving that impression,...
Ransomware illustration

Your Data Can Be Kidnapped Too… Ransomware in Action

According to Wikipedia “Ransom is the practice of holding a prisoner or item to extort money or property to secure their release, or it...
Hacker illustrationvideo

NowProtected Secure Browser

NowProtected For your eyes only! E-Banking has become a necessity for many people in today’s world. It minimizes the need to physically visit your bank and...
Hacker

Effectively Securing Your Corporate Web Applications in 5 Steps

According to the latest Verizon Data Breach Investigations Report, cyber-attacks are on the rise. The cat-and-mouse game between hackers and defenders of corporate web...

PwnTillDawn Online Battlefield – New Features and Improvements

Our CTF style Penetration Testing lab, PwnTillDawn Online Battlefield just got some awesome new features and improvements we are sure you will...

PwnTillDawn, wizlynx group’s Computer Hacking Contest in Mexico City

Pwn Till Dawn is a computer hacking contest organized by wizlynx group, which is 100% oriented offensive security, and which will be...

The Rise of Artificial Intelligence in Cyber Security

Currently, the new trends in cyber security are the use of artificial intelligence (AI) and machine-learning to predict threats before they are even conceived....
- Advertisement -
Ethical Hacking and Penetration Testing

Recent Posts