Articles

Survive to Amplification
It is a tec-compose in the context of DoS/DDoS Distributed Denial of Service, where attacking or executing a pentest the query is pretty small for the server “reflector” weakness (public Memcached) , but false origin IP of victim. The reflector send ...

A.I hallucination cascade
También conocido como “Lavado de información en AI”, aka: “information laundering through AI”, Cómo una noticia falsa en un periódico acaba convertida en “verdad” por Grok, Claude y ChatGPT. Information laundering: cuando la IA convierte mierda en ...

How Tails works and for what?
To use Tails, shut down the computer and start on your Tails USB stick instead of starting on Windows, macOS, or Linux. That’s how start the explanations about a SO which capabilities are amazing but also used by many hackers red_hat. A blue-teaming ...