Search Results for:

Thank you

Thank You We’ve received your message. We’ll contact you as soon as possible. Go back home Discover Blogs Keep Exploring Deploy Technologies Hub Inventory Learn More Compliance IR Management Tool Insights Batuta AI Learn More ZeroAPT Threat Intel SOC Forensics Learn More

Thank you Read More »

Events

Webinar Protecting innovation: Challenges and Solutions for Fintechs in LATAM April 12 // 11 AM (CDT) Upcoming events 23 April Webinar DeepFake Online The new ways to lose your identity by Salvador Mendoza, R&D Director of Metabase Q HSBC. keep me updated May 2024 HackDef Announcement Online Hacking competition for universities 21 June Cybersecurity during

Events Read More »

Batuta

Manage, Measure And Mature Your Cyber Defense In One Trusted Platform Get batuta Welcome to Batuta Command and Control Imagine if you had complete visibility and control of your cybersecurity technologies and assets in one dashboard. Identify & Protect The key to effective defense is complete visibility. With Batuta, you get a panoramic view of

Batuta Read More »

Community Resources

community Education Program Cybersecurity Executive Program An exclusive program specifically designed for executives where they can acquire the necessary training to address current cybercrime and cyberattacks, as well as the available solutions to protect their companies. Conversations with Industry Leaders Each module of this course features the top experts and innovators in cybersecurity, allowing you

Community Resources Read More »

Bluetooth Bugs Leaves Thousands of PoS Devices Vulnerable in LATAM

By Bryan Gonzalez from Ocelot Team Every year, Metabase Q conducts numerous assessments on Point of Sale (PoS) devices across LATAM. These assessments play a crucial role in strengthening companies’ devices before they hit the market. Through these evaluations, the Ocelot Offensive team has identified a prevalent trend: approximately 90% of PoS devices integrate Bluetooth

Bluetooth Bugs Leaves Thousands of PoS Devices Vulnerable in LATAM Read More »

Advanced Persistent Threat / APT

An advanced persistent threat is deployed by cyber-criminals who have a high level of expertise and important resources to infiltrate a network. They usually use this type of attack to target large organizations seeking to retrieve economic or financial information. In some cases, they might even try to use this form of attack to stop or block a company’s program or agenda. Since an advanced persistent threat is executed over long periods of time, it is difficult to detect and block by average users and requires a specialized security program or a team of experts to find a solution.

Advanced Persistent Threat / APT Read More »