Dashboard » Noticias
José Moreno
José Moreno
José Moreno
Estevenson Luis Solano
Elzer Pineda
Noticias sobre ciberseguridad
Herramientas Serverless para Pentesting
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T074342Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=e5b4c1e0892a9516925a175857e77f15985f7e0d6db6e1c26ccb9f2a06947242)
En múltiples ocasiones nos ha tocado realizar pensteting pero no ..
Análisis de Vulnerabilidades con Flan Scan
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T074342Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=e5b4c1e0892a9516925a175857e77f15985f7e0d6db6e1c26ccb9f2a06947242)
Es una herramienta de escaneo de vulnerabilidades creado por clou..
OSINT Docker Registry
![](https://bta-plataform-prod.s3.amazonaws.com/variants/9Q1ZYPvUnUnQhBMe5a56NaTQ/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22JoseMoreno-300x180.jpg%22%3B%20filename%2A%3DUTF-8%27%27JoseMoreno-300x180.jpg&response-content-type=image%2Fjpeg&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T074342Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=e5b4c1e0892a9516925a175857e77f15985f7e0d6db6e1c26ccb9f2a06947242)
Recientemente he tenido algo de tiempo para dedicarme a escribir ..
Los cibercriminales comprometen cada vez más el ciberespacio
![](https://bta-plataform-prod.s3.amazonaws.com/variants/Lxz1UcrnNkKTKcPsXTYJrdS4/00733053b3389304974620f96f1648b6c9e8108780ff90123bf7e539e5d02088?response-content-disposition=inline%3B%20filename%3D%22download12.png%22%3B%20filename%2A%3DUTF-8%27%27download12.png&response-content-type=image%2Fpng&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA2AFP3MP5O4O7RT5M%2F20240727%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240727T074342Z&X-Amz-Expires=300&X-Amz-SignedHeaders=host&X-Amz-Signature=1e2d0588750544eb8735fc160d5daef05d34f3e0c18dfdc232119f2e634de982)
Ante la pandemia global de COVID 19 la ciberseguridad ha sido un ..
Instalación y configuración para ambiente de laboratorio de Pentest controlado p...
![](https://djo7sloxtuec0.cloudfront.net/assets/avatar-50-0786e8de7062852709e518d8a1d88272d584f121d70a493ea2a4857c60914f31.png)
En la actualidad para desarrollar un laboratorio de pentesting de..