The digitalization of the financial sector has optimized service efficiency, remote access to banks and improved user experience. However, the risk of suffering cyberattacks has grown exponentially. In this context, cybersecurity has become a key strategic pillar for the progress of digitalization in the banking sector. The vast majority of reports show banks and Fintechs are the most attacked...

AI Under Attack: A Threat Evolving at the Speed of Technological Innovation
In 2025, Artificial Intelligence (AI) systems are not only tools for productivity, automation, and advanced analyticsโthey have also become new attack vectors for cybercriminals. From data manipulation to direct model exploitation, the threat landscape is evolving as rapidly as AI itself. For professionals in cybersecurity, cyberdefense, and technology consulting, understanding these threats...

Large Language Models (LLMs) in the IT Sector: Log Analysis and Anomaly Detection in Network Traffic
Artificial intelligence is revolutionizing the IT sector, and Large Language Models (LLMs) have proven to be powerful tools to increase automation, security and efficiency in technology infrastructure management. Traditionally, LLMs have been used in natural language processing (NLP). However, their ability to analyze large volumes of data and detect patterns also makes them valuable in IT. In...
Quantum computing and cybersecurity
We are currently in the midst of a quantum computing revolution that threatens to break all processing limits. When we apply these concepts to cybersecurity, we find potential quantum computing applications that can help us improve cybersecurity or crack it. Quantum computing can become a means to break one of the pillars of cybersecurity over the years: RSA-based encryption. Thousands of...
Network Behavior Analysis: Key to guarantee Security and Performance
In an increasingly complex and interconnected technological environment, the performance and safety of IT networks are key aspects for any organization. Traditional monitoring and protection systems are not enough to respond to advanced threats or optimize the use of resources. Here is where network behavior analysis comes in handy. Not only does this strategy detect problems in a proactive...
Cybersecurity vulnerabilities are affecting to suppliers and customers
In addition to being a data protection tool, cybersecurity software is the first line of defense against external threats or cybersecurity vulnerabilities. So, what happens if the software itself is vulnerable? In the last few years, weโve seen how attackers exploit bugs and errors in cybersecurity tools to access critical data and protected systems. These attacks affect not only software...
Categories/Tags