Eduard Bardají

Posts by Eduard Bardají
Pentesting vs Red Teaming: Which is the best option?
pestenting vs red team

Pentesting vs Red Teaming: Which is the best option?

Jul 15, 2024 2:08:42 PM 2 min read
MITRE ATT&CK: What is it and how does it work?
MITRE ATT&CK - What is it and how does it work?

MITRE ATT&CK: What is it and how does it work?

Jul 12, 2024 1:43:41 PM 3 min read
DrDoS cyber attack analysis
DrDos analysis

DrDoS cyber attack analysis

Jul 3, 2024 4:26:08 PM 4 min read
Compromised email account? How to act when your account is hacked
Compromised email account

Compromised email account? How to act when your account is hacked

Jun 19, 2024 12:48:03 PM 4 min read
Democratization of cyber attacks
Democratization of cyber attacks

Democratization of cyber attacks

Jun 18, 2024 7:56:02 AM 3 min read
Managed Detection Response (MDR): ¿What is it and why is it worthy?
MDR

Managed Detection Response (MDR): ¿What is it and why is it worthy?

Jun 10, 2024 2:11:02 PM 3 min read
Latest trends in cyberattacks
lates trends in cyberattacks

Latest trends in cyberattacks

Jun 10, 2024 2:08:56 PM 2 min read
Cybersecurity in the educational sector
cybersecurity-educational-sector

Cybersecurity in the educational sector

May 17, 2024 12:49:55 PM 3 min read
How to recover files encrypted by ransomware
recover files encrypted by ransomware

How to recover files encrypted by ransomware

May 13, 2024 1:56:46 PM 2 min read
What is social engineering and how to protect yourself: Complete Guide
social engineering

What is social engineering and how to protect yourself: Complete Guide

Nov 9, 2023 12:27:20 PM 6 min read
Complete Guide on Cybersecurity in Biotechs and Laboratories
Cybersecurity in biotechs and laboratories

Complete Guide on Cybersecurity in Biotechs and Laboratories

Nov 9, 2023 11:33:24 AM 4 min read
Ethical hacking applied to the pharmaceutical sector
hacking ético farmacéuticas

Ethical hacking applied to the pharmaceutical sector

Nov 3, 2023 4:19:08 PM 2 min read
ESED. Cyber Security & IT Solutions

Blog

Articles about cybersecurity and IT services

Pentesting vs Red Teaming: Which is the best option?
MITRE ATT&CK: What is it and how does it work?
DrDoS cyber attack analysis
Compromised email account? How to act when your account is hacked
Democratization of cyber attacks
Managed Detection Response (MDR): ¿What is it and why is it worthy?
Latest trends in cyberattacks
Cybersecurity in the educational sector
How to recover files encrypted by ransomware
What is social engineering and how to protect yourself: Complete Guide
Complete Guide on Cybersecurity in Biotechs and Laboratories
Ethical hacking applied to the pharmaceutical sector