transfer
transfer

Man in the middle: what is it and how to prevent it?

Man in the middle

What are "Man in the Middle" attacks? As their name indicates, they are those cyberattacks in which the hacker gets in the middle of the communications between sender and receiver, intercepts the message and modifies it. Thus, some hackers managed to steal 1 million euros from an Israeli Startup, and as a consequence, take it to… Leer más

Tranxfer and integration with Microsoft Teams

Microsoft Teams is Microsoft's online work environment for companies. It integrates all collaborative applications into the same ecosystem, such as chat, calls and meetings, the calendar, and Onedrive or Sharepoint for information sharing. From now on, it is also possible to integrate Tranxfer as a Plugin. Transfer prioritises… Leer más

Phishing, the hook in your inbox

Phishing is a technique in which a cybercriminal sends an email to a user pretending to be a legitimate entity (social network, bank, public institution, etc.). The goal is to steal private information, charge financially, or infect the device. To achieve this they attach infected files or links to fraudulent pages in the mail… Leer más

cyber insurance

The implementation of remote working has been a milestone for technology companies and a mine for cyber attackers. The market has reacted quickly, increasing the popularity of insurers specializing in cybersecurity; Cyber insurance is booming. The companies that offer the most conventional insurance propose the following paradigm: If… Leer más

Security and Telecommuting

Security and Teleworking. Union make force. Although teleworking was already a concept that was gradually beginning to be implemented in companies, in a short time and due to various circumstances, most organizations have been forced to implement this work model. Teleworking has come into the life of... Leer más

Cybersecurity Teams: Red, Blue & Purple Team

Red Team, Blue Team & Purple Team. Action, Defense and Evaluation The cybersecurity sector is in continuous evolution and it is necessary to be prepared for each of the possible situations that may occur. That is why there are different cybersecurity teams: the Blue Team, the Red Team, and the Purple Team. Each … Leer más

Email vulnerabilities as a corporate communication channel

Vulnerabilities of email as a corporate communication channel Email is one of the most used means of communication in recent times through the Internet. But, it is true that although the security of this medium has been improved, email continues to have vulnerabilities that allow cybercriminals to steal... Leer más