System Vulnerabilities in Cybersecurity
System vulnerabilities in cybersecurity are being exploited with increasing sophistication and precision. The risk for institutions and companies, regardless of their size, is increasingly evident. In recent times, we have witnessed numerous attacks, including on important public institutions such as the SEPE in Spain or the Colonial Pipeline, the largest oil pipeline network in the US. In this scenario, it is essential for organizations to reduce the risk of suffering a cyber attack. To delve deeper into this, in this article we will talk about system vulnerabilities in cybersecurity.
What is a Cybersecurity Vulnerability?
A vulnerability is a weakness or flaw within an information system that poses a security risk. It could originate from a configuration error, design flaws, or procedural failure.
This security “hole” represents an entry point for cybercriminals who use these vulnerabilities to enter our system and compromise its availability, integrity, and confidentiality.
Therefore, it is vital to keep our systems safe, find these vulnerabilities as soon as possible, and fix them to avoid these risks.
Difference between vulnerability and threat in cybersecurity
As mentioned, vulnerabilities are flaws, “security holes” in our system. Threats are those actions carried out by cybercriminals who exploit these vulnerabilities.
Therefore, they are different things. The vulnerability is the security breach while the threat is the action that exploits the security breach.
Generally when vulnerabilities appear, there will always be someone who will try to exploit them.
What types of vulnerabilities can I have?
We will now discuss the types of vulnerabilities we can suffer from. However, it is worth remembering that some are more important than others. We will have to assess the importance of each vulnerability, as having an exposed database is not the same as having a leaked commercial PDF.
We will now comment on the types of vulnerability by establishing the following classification:
SQL injection vulnerabilities
These vulnerabilities occur when SQL code that was not part of the programmed code is inserted. This technique alters the operation of a database.
The attacker’s hostile data can trick the interpreter into executing unwanted commands or accessing data without authorization.
Authentication vulnerabilities
These are flaws related to input data validation that allow attackers to access our system.
Another critical point here is passwords. Using insecure passwords makes systems vulnerable, and if they are easily cracked, they can lead to incursions by unauthorized third parties.
Vulnerability exposed data
Many web applications and APIs do not adequately protect sensitive data, such as financial, health, and personal information. Attackers can steal or modify this weakly protected data to commit credit card fraud, identity theft, or other crimes.
Configuration vulnerabilities
These types of vulnerabilities are due to software or server misconfigurations. It can lead to system disablement or other more powerful attacks, such as a Dos attack.
Other types of configurations are related to security, such as open cloud storage and misconfigured HTTP headers.
All operating systems, frameworks, libraries, and applications must be securely configured and patched/updated promptly.
XSS (Cross Site Scripting) Vulnerabilities
This type of vulnerability is characterized by allowing scripts from languages such as VBScript or Javascript to be executed. XSS flaws occur when an application includes untrusted data on a page without proper validation or escaping.
Cybercriminals can hijack user sessions by executing these scripts. Phishing to steal passwords and data is an example of such an attack.
Component-related vulnerabilities
Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application.
An attack could result in data loss or server access if any of these components are vulnerable.
Kartos locates your organization's exposed vulnerabilities
Kartos Corporate Threat Watchbots is the Continuous Threat Exposure Management platform developed by Enthec for the protection of organizations. Thanks to its technology designed to scan the three layers of the web in search of threats, Kartos locates open gaps and exposed vulnerabilities in your organization to prevent them from being used by cybercriminals to develop an attack. Contact us to learn more about how Kartos can help you neutralize exposed system vulnerabilities and avoid the threats they entail.
María Rojo in the SIC Magazine

Our CEO, María Rojo, answers the question ‘Threats and cyber-attacks in 2024: which ones will be the most complex and high impact, whether they are expected or not?’, asked by SIC Magazine for its February special edition. Special report on cyber threats and cyber-attacks 2024.
Let’s talk about encryption
Encryption is one of the main tools for keeping us safe when surfing the Internet or using different applications. Encryption helps us protect and keep our activity, the information we share, and our personal and session data secure.
What is encryption?
Encryption can be included within cryptography. It is a technique for encrypting or encoding texts or information so that they are only accessible by the sender and receiver. This technique uses complex mathematical algorithms to encrypt information in computer science and cybersecurity. To consider that information or text has been encrypted, it must meet a series of requirements or characteristics:
- Privacy: Information is only accessible to authorized persons.
- Integrity: The information has not been modified by any external agent. It must be kept intact from when it is received until it is delivered.
- Authentication: Verifying the other party's identity within this information exchange must be possible.
- Non-repudiation: Either party can deny that it has transferred such information.
This is why encryption is one of the most popular and effective data security methods companies use.
Types of encryption
Within the world of cryptography, we can differentiate between two types of encryption: symmetric and asymmetric.
Symmetric encryption
Symmetric encryption, also called secret key cryptography, is a cryptographic method that uses the same key to encrypt and decrypt messages at the sender and receiver. Once both parties have access to this key, the sender encrypts a message using the key, sends it to the recipient, and the recipient decrypts it with the same key. It is the oldest form of encryption and is still relevant because of its data transmission speed. The encryption algorithms used for this type are Blowfish, RC4, DES, AES-128, AES-256, etc.
Asymmetric encryption
Asymmetric encryption, also known as public key cryptography (PKI), is a cryptographic method that uses two public and private keys to transfer data and information. In asymmetric encryption, the sender uses the public key to encode information in an unreadable form, which can only be decrypted or read with a secret key. When sending encrypted data from the public key scheme, the receiver needs a hidden key to access the encrypted data. Some of the most used algorithms for this type of encryption are DSA, RSA, PKCS, and EIGamal.
Differences between symmetric encryption and asymmetric encryption
Some of the differences between these two types of encryption have already been explained in their definition. Let us comment on them:
Security
Symmetric encryption is older and uses only one key, which must be communicated with the risk that this entails. However, asymmetric encryption uses two keys and securely communicates the public key to third parties. Although asymmetric encryption is more secure, a priori, each case will have to be looked at individually, and the combination of both ciphers is very interesting.
Speed
Asymmetric encryption, which is more complex, requires more time in its encryption and decryption processes than symmetric encryption. However, some organizations opt for symmetric encryption because it is faster.
Number of keys
Key management is also a benefit of using asymmetric encryption. You only need one key pair per user to encrypt messages for all other users. As we saw with symmetric encryption, as the number of users increases, the number of keys increases. Asymmetric encryption is better when encrypting communications with a large volume of data in transit. On the other hand, symmetric encryption is usually used to transmit small volumes of data in authentication systems.
Types of Malware and keys to prevent these attacks from affecting the security of your company
Protecting against malware involves deploying a corporate strategy based on in-depth knowledge of the threat.
From Enthec, we tell you what malware consists of and its different types.
What is malware
A malware attack is a malicious attempt to gain access to computer systems, networks, or computers to steal sensitive information, infect systems, encrypt data, or cause damage. The goals of malware include gaining unauthorized access, stealing data, encrypting information, or damaging the affected system.
Organizations must be aware of and protect against these attacks because of the serious consequences they can entail if successful, such as financial losses, operational disruptions, data recovery costs, and reputational damage.
If you're wondering how many types of malware there are, read on; we'll tell you below.
The Different Types of Malware You Need to Know About
Malware can be classified into different categories depending on its purpose:
Virus
One of the most well-known types of malware is viruses. These viruses aim to disrupt the normal functioning of the computer device, regularly replacing executable files with others that contain the device's code.
Its infection can be through removable devices, emails, or network connections.
Adware
It is software designed to display unwanted advertising on screen. One of the methods that infects the system is after downloading a program and inadvertently allowing permissions.
The other method of infection can be browsing a website, taking advantage of the vulnerability in the user's browser to perform an unintentional download.
Spyware
It is a type of malware that hides in the computer system, monitors user activity, and steals information.
In this case, it is infected through unsafe web pages, taking advantage of vulnerabilities through ads or pop-ups that, when clicked, download this type of malware.
Trojan
This malware appears legitimate, harmless software but aims to control your computer, introduce more malware, steal data, and spread to other devices.
Rear doors
Back Doors
After installation, it provides access to malicious users to control a computer remotely.
It infects computers from untrustworthy websites or downloads. It can also infect through emails.
Keyloggers
Records keystrokes made on the keyboard to store them in a file and send them over the Internet. They can be hidden on removable devices, in emails or downloads from non-legitimate pages.
Thieves
This type of malware accesses private information stored on the computer to steal and share the most sensitive data, such as passwords.
Ransomware
Ransomware is a type of malware that infects a computer to take control of it and, in exchange, demands a ransom payment.
When ransomware infects your computer, it encrypts all files and folders, preventing access without a key. It is spread through attachments in untrustworthy emails or web pages.
Computer worm
They are programs that make copies of themselves by remaining in different places in the system. They can make system changes without authorization, decreasing system performance or worsening the connection.
Rootkit
This type of malware allows hackers to access your computer without your knowledge to hide the processes and files on your system for a malicious purpose. It can infect other devices with files or downloads from non-legitimate sites.
Botnets
Botnets are any group of devices that are infected and controlled remotely by an attacker to control as many devices as possible and carry out illicit activities.
It spreads through malicious code on websites after exploiting its vulnerability.
Rogueware (rogue software )
This type of malware masquerades as a security tool that launches an alert or a fake message indicating that something is wrong with the computer to click on a link to download software that solves the problem.
Cryptojacking
Cryptojacking is a type of malware that involves cybercriminals using users' devices without their consent and using the machine's resources to "mine" forms of online money known as cryptocurrencies.
Malicious Apps
These types of apps masquerade as legitimate apps or try to emulate other successful apps.
Once installed on the device, they will ask us for a series of abusive permissions or, on the contrary, they will make fraudulent use of those permissions.
Ways to get malware into a system
Malware gets into a system in different ways. Some of the most common are:
- Email: Cybercriminals often use email to distribute malware. This can be through malicious links or attachments in phishing emails.
- Internet downloads: Some websites may try to install malware on a device when you visit or download something from them. This is especially common on websites that offer freeware or pirated software.
- External storage devices: Devices such as USB drives can contain malware. If they connect to the system, malware can install itself automatically.
- Exploiting vulnerabilities: Cybercriminals often exploit software vulnerabilities to introduce malware into a system. This can be through outdated or unpatched software.
- Social media: Malicious links can also be distributed through social media platforms. Clicking on a malicious link can install malware.
- Mobile apps: Malware is often spread through malicious apps on mobile devices. These apps may look legitimate, but they contain malicious code.
You may be interested in our post→ Common types of cyberattacks.
How to identify a potential malware infection
To identify if a computer is infected with any malware types, it is crucial to pay attention to specific telltale symptoms. Some of the common signs of malware infection include:
- Slow system performance: If your computer runs slower than usual, freezes, or doesn't respond appropriately, it could indicate infection.
- Pop-up messages: The constant appearance of pop-up messages on the desktop can signify infection.
- Internet connection issues: Difficulties connecting to the internet or slow browsing can indicate the presence of malware
- Unexpected changes in the system: new icons on the desktop, files with unknown extensions, disappearance of the antivirus, or deactivation of the firewall are red flags.
- Abnormal computer behavior: Automatic actions such as opening unsolicited windows, changes in application languages, or missing files needed to run programs can be signs of infection.
Awareness to protect against malware
Since malware infection is almost always the result of social engineering techniques, malware awareness is essential in any work environment.
Knowledge is the best protection against significant damage to computer systems, including data loss, information theft, and disruption of business operations.
It's critical for everyone in any organization to understand malware, how it spreads, and how they can prevent it. This can include training on identifying suspicious emails, the importance of not downloading files from unknown websites, and the need not to click on unsolicited links.
This training and awareness must be regularly updated to prevent routine and trust from becoming vectors facilitating the attack.
In addition, workers should also be aware of the warning signs of a malware infection, such as slow system performance, frequent crashes, unwanted pop-up ads, and unexpected changes in system settings.
The time that elapses between the attack, detection, and communication is essential to protect against the malware deployed and avoid or minimize damage.
Protect mobile devices from malware
Mobile devices are now incorporated into any organization's work. Many of them are privately owned by workers, who use them outside of working hours and the work environment.
Therefore, to protect against malware, the organization must expand the scope of training and awareness to include this type of device, as long as it can access the corporate system from it.
Some recommended actions to protect mobile devices against different types of malware are:
- Regular updates: keep the operating system and all applications current. Updates often include security patches that protect against new threats.
- Security software: Install a reliable security application with antivirus and anti-malware protection. Some of these apps also include additional features such as remotely locking and wiping the device if it is lost or stolen.
- Safe downloads: Only download apps from official app stores like Google Play Store or Apple App Store. These stores typically have strict security policies and review apps for malware.
- App permissions: Review the permissions that an app requests before installing it. If an app requests unnecessary permissions for its operation, it could be a sign that it is malicious.
- Safe browsing: Avoid visiting unsafe websites or clicking on suspicious links that could install malware on your device.
- Public Wi-Fi: Be careful when using public Wi-Fi networks, as cybercriminals frequently use these networks to spread malware. It's wise to consider using a VPN when you're on public Wi-Fi.
- Screen lock: Use a screen lock to protect your device in case it is lost or stolen. This can help prevent unauthorized access to your information.
In-depth threat knowledge allows organizations to effectively protect against malware types and leverage the capabilities of new cybersecurity solutions, such as our Kartos Corporate Threat Watchbots cyber surveillance platform to prevent attacks before they materialize. Contact us to learn about our solutions!
Common Types of Cyberattacks (Part I)
In this article, we will talk about the most common types of cyberattacks.
We call cyberattack any offensive maneuver employed by individuals or whole organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices. These attacks try to hack into a system using one or several digital acts, usually from an anonymous source, to steal, alter, or destroy a specified target.Among the common types of cyber attacks we find the following:
Malware
Malware is any software that intentionally performs malicious actions in a system without the user's knowledge. Viruses, worms, and trojan horses are different kinds of malware.
Virus
A computer virus is a small script of code that, when executed, replicates itself by modifying other computer programs called hosts and inserting its code to alter how a computer operates. Of course, since this is a type of malware, it is all done without the permission or knowledge of the user.
Worm
A computer worm is a standalone malware program that replicates itself to spread to other computers. This differs from a virus because the virus needs a host program, but the worm does not. A worm often uses a computer network to spread itself, relying on security failures on the target computer to access it. Once there, it will try to scan and infect other computers.
Trojan Horse
A Trojan Horse Virus is malware that downloads onto a computer disguised as a legitimate program. It typically gets hidden as an email or free-to-download file attachment and then transfers onto the user’s device. Once downloaded, the malicious code will execute the task the attacker designed it for, such as spying on users’ online activity or stealing sensitive data.
Kartos helps you protect your organization by locating its vulnerabilities
Kartos Corporate Threat Watchbots is the monitoring platform developed by Enthec for the protection of organizations. Using its army of bots, Kartos crawls all three layers of the web, locating exposed vulnerabilities and open gaps in the organization that can be used to execute any of the common types of cyberattacks we just saw. Thanks to kartos, organizations can proactively defend themselves against these threats, preventing them from materializing. Contact us for more information on how Kartos can help you protect your organization.
Do you know how to protect your user privacy?
The tendency of users when using technologies is not to worry about the use of their private information.
Acquiring private information can be dangerous if that data is not protected. Such vulnerable data can be stolen by cybercriminals and published through leaks on the deep web
When using internet services, they commonly use tracking methods in which information is actively or passively collected from the user. This information is trusted not to be used by a third party, exposing threats to your privacy.
Tracking Techniques
Some tracking techniques used to profile habits, tastes, and other user details are explained below.
- Cookies: Text files that store information sent by the web service in the user’s browser.
- Privacy policies: When the online service stores and manages confidential data, it must indicate to the user how this information will be used.
- HTML5 elements: Storage mechanism, also known as “Client-Site-storage,” with more storage capacity than cookies.
- IP address and geolocation: When a user browses the Internet, the service provider automatically assigns the user an IP address. An online service can use this IP address to identify the user's city of residence.
- Social Networks: All social networks, such as Twitter, Facebook, or Instagram, collect information from users and share it with third parties.
- Google services: Google has several services that monitor and record each user's activity.
Tools to protect yourself
The following are some of the most commonly used online tools and services to prevent personal information filtering.
Search Engines
There are alternative search engines where there is no vulnerability to privacy when it comes to making queries and doing so confidentially and anonymously:
- Ixquick: A search engine that does not record IP addresses, does not correlate with visitors and search criteria, and does not use tracking cookies.
- Startpage: Search engine based on Ixquick with the characteristic that it can function as a proxy server between the user and the Google search engine. The results will be the same as those returned by Google but without collecting information about the user who performs the searches.
- DuckDuckgo does not record the user’s personal information or search criteria, nor does it allow the sending of information about the user or their search criteria. It also does not allow sending information about the user to the sites he/she visits.
Privacy settings in browsers
- Firefox: The privacy settings section called “Tracking” contains the alternative to indicate options to prevent tracking.
- Opera: Configuration options that allow the management of cookies, SSL certificates, and passwords can be applied.
- Chromium: In the same way as Opera and Firefox, managing various cookie management privacy details is possible.
- VPN: VPN is a technology that allows private connections between two points using a public network such as the Internet. The benefit of VPNs is to hide the user’s IP and to be able to access Internet sites that are blocked in the country from which the request is made. The VPN service routes the request to the website using an IP address belonging to a different country.
Anonymous Proxy Servers
A proxy server is a middleware solution, which works by routing requests and responses transparently between the two. It allows the possibility of hiding the client’s IP address, as the destination will only see the proxy's IP address.
There are several lists of anonymous proxy servers that allow IP hiding data.
Other solutions
There are other exciting techniques and tools to protect against tracking that are interesting and could be explored in more detail:
- HTTPS Everywhere extension: Extension developed by the Tor Project and EFF team, with the primary objective of capturing requests made with the HTTP protocol against a list of sites and overwriting requests so that they use HTTPS.
- Web browser plug-ins: Extensions that allow you to easily clean information stored in the browser, such as Click and Clean.
- Privacy Bagder: Add-on developed by EFF that allows you to block trackers such as Ghostery but also will enable you to block “Ads”.
Qondar helps you protect your personal information
Qondar Personal Threat Watchbots is the cyber surveillance platform developed by Enthec for the protection of people's information and digital assets. Thanks to its continuous and automated monitoring capabilities, Qondar crawls the Internet, the Depp Web and the Dark Web and locates leaked and exposed personal information, issuing alerts about the findings in real time. Contact us to find out how Qondar can help you protect your privacy online
Enthec in Leanfinance
Enthec in Leanfinance
https://leanfinance.es/enthec-caso-exito-sector-ciberseguridad/
Enthec participates in FEINDEF, the International Defence and Security Exhibition
Madrid, 17th, 18th and 19th May 2023:
Enthec participates in FEINDEF, the International Defence and Security Fair, a reference forum for the defence and security sector in Spain, invited by INCIBE in the Innova for Def&Sec Space.

Phishing: What Is It and How Many Types Are There
In this article, we will continue to expand our information on one of the most common types of cyberattacks: phishing.
Phishing is a set of techniques that aim to deceive a victim and gain their trust by impersonating a trusted person, company, or service (impersonation of a trusted third party). The impersonator is called a phisher. The goal is to manipulate the victim and make them perform actions they should not perform (e.g., reveal confidential information or click on a link).
There are several types and examples of phishing, each with specific methods to trick victims. In this post, we describe the most outstanding ones and explain how to protect yourself from them through Enthec's solutions.
The most prominent types of phishing
Knowing the different types of phishing and how to identify the warning signs will help you protect your information and navigate the digital environment more safely. Read on to find out everything you need to know!
Email phishing
Most of these phishing messages are sent through spam. They are not personalized or directed to a specific person or company, and their content varies depending on the phisher's goal.
Common phishing targets include banks and financial services, cloud productivity and email providers, and streaming services.
Voice phishing
Voice phishing is the use of the phone to carry out attacks. Attackers use VoIP (Voice over IP) technology to make numerous fraudulent calls cheaply or for free to obtain codes, passwords or bank details from the victim, who often does not suspect anything.
SMS phishing
Smishing is a form of phishing in which mobile phones are used as an attack platform. Smishing attacks typically invite the user to click on a link, call a phone number, or contact an email address provided by the attacker via SMS message. Smishing is a form of phishing in which mobile phones are used as an attack platform. Smishing attacks typically invite the user to click on a link, call a phone number, or contact an email address provided by the attacker via SMS message. The criminal attacks with an attempt to obtain personal information, including credit card or social security numbers.
Page hijacking
It is achieved by creating an illegitimate copy of a popular website where visitors are redirected to another website when they log on.
Calendar spoofing
Calendar spoofing is when phishing links are delivered via calendar invitations. Calendar invitations are sent that, by default, are automatically added to many calendars.
Whaling
Whaling, also known as CEO fraud, is similar to spear phishing but focused on senior executives or people with critical organizational positions. Attackers are looking to gain valuable information or authorize fraudulent financial transfers.
To learn more, access our post→ What is CEO fraud, and how can it be avoided?
Spear phishing
This well-known type of phishing stands out for carrying out attacks that target specific individuals or companies. Cybercriminals research their targets to personalize messages and increase the likelihood of success. For example, they may impersonate a colleague or boss by requesting sensitive data.
If you want to learn more about this type of phishing→ What is Spear Phshing: 4 keys to protect your company.
Qrshing
The trend of using QR codes has also led to the emergence of some scams, such as this type of phishing, which specifically consists of creating malicious QR codes that, when scanned, direct victims to fraudulent sites designed to steal personal information.
Main keys on how to prevent phishing
Now that you know the main types of phishing, it is essential to consider the keys to prevent them.
- Verify the authenticity of messages. Before clicking links or providing information, confirm that the sender is legitimate.
- Don't share sensitive information. Avoid providing personal or financial data through links or unsolicited calls.
- Keep your software up to date. Make sure all devices and apps have the latest security updates.
- Use multi-factor authentication (MFA). Add extra layers of security to protect accounts.
- Educate and raise awareness. Participate in cybersecurity training programs to recognize and prevent phishing attempts.
If you have been the victim of an attack, you should first change your access credentials and notify the impersonated entity to solve the phishing. In addition, it is advisable to use threat monitoring solutions, such as Enthec's Kartos, which allows you to detect active campaigns and prevent new fraud attempts.
Kartos by Enthec helps you locate active phishing campaigns
Kartos Corporate Threat Watchbots is the monitoring and cyber surveillance platform developed by Enthec for the protection of organizations. Among its capabilities, the real-time location of active phishing campaigns with corporate identity theft and their monitoring until their total deactivation stands out.
Contact us to learn more about how Kartos can help protect your organization from phishing and other threats.
The Three Layers of the Web: Internet, Dark Web and Deep Web
This article will discuss the Internet, the Deep Web, and the Dark Web and the content found in each. These are commonly referred to as the three layers of the Web or the three levels of the Web.
Internet
The Internet is a web-like network of interconnected computers worldwide. It consists of servers that provide information to millions of people who are connected through telephone and cable networks. Its origins date back to 1969, when the first computer connection, known as ARPANET, was established between three universities in California (United States).
One of the most successful services on the Internet has been the World Wide Web (WWW or the Web), to such an extent that confusion between the two terms is common. The WWW is a set of protocols that allows, in a simple way, the remote consultation of hypertext files.
The Deep Web
The Deep Web is part of the World Wide Web and cannot be found on common search engines like Google. The part that is available to everybody is called the Surface Web. The first person to use the term “Deep Web” was Mike Bergman, a computer scientist, in 2000.
The Deep Web is not the same as darknet or the Dark Web, though they could quickly appear to have the same meaning.
Accessing the deep web does not require unique protocols; that is the main difference.
The Dark Web
This term refers to content that search engines do not index, requiring authorization or special software to access. It is all that deliberately hidden content that we find on the Internet.
A darknet is a private or closed computer network. The Dark Web comprises independent networks (specific networks such as TOR or IP2).
The Dark Web is a part of the World Wide Web located on the darknets. To access it, you must know a password and use specific software. It can only be accessed through the Tor or IP2 browser. The encrypted nature of the browser means that anyone trying to access the dark web remains anonymous by default.
Google or any other search website cannot find a darknet. The Dark Web exists within the Deep Web but is not an equivalent network.
Kartos crawls the three layers of the Web to locate vulnerabilities in your organization
Kartos Corporate Threat Watchbots is the Continuous Threat Exposure Management (CTEM) solution developed by Enthec to protect organizations. Through its army of bots, Kartos crawls the Internet, the Deep Web and the Dark Web to locate exposed vulnerabilities and open corporate breaches that are public and for sale and that can be used to engineer a cyberattack against the organization. Kartos works continuously, automated, autonomous and in real time. It does not require implementation in the organization's IT system and issues alarms in real time about the vulnerabilities and threats it finds. Contact us to receive more information on how Kartos can help you neutralize ongoing threats against your organization.
Media presence: TiC Cybersecurity
Read the full story
https://ciberseguridadtic.es/entrevistas/enthec-las-companias-estan-mucho-mas-abiertas-de-lo-que-ellas-mismas-pueden-suponer-202304031651.htm