microhackers iot

MicroHackers Blog: AI, IoT, Cybersecurity & Cloud Security Insights

kit digital

What is the Digital Kit?

It is an aid program offered by the Ministry of Economic Affairs and Digital Transformation to finance the digital transformation…

que-es-ciberseguridad

What is cybersecurity?

Cybersecurity is the set of techniques, technologies and procedures used to protect computer systems and communication networks from attacks, intrusion…

Illustration of a glowing digital globe under a magnifying glass, surrounded by binary code and cybersecurity icons, symbolizing the Log4Shell vulnerability (CVE-2021-44228), with futuristic city blocks and digital infrastructure in the background.

Understanding Log4Shell: Guide to Log4j Vulnerability CVE-2021-44228

The Log4shell vulnerability for Log4j, CVE-2021-44228, the exploit that everyone talks about and that allows remote code execution on any…

oldest server

Legacy Servers: Unveiling Security Risks & Solutions

It’s time to inventory your network to identify your oldest server to replace or migrate away from. Maybe your future…

black friday

Black Friday Scams: Top Threats to Avoid

In the big shopping day worldwide and you have to be careful with the black friday scams that cybercriminals create…

Digital representation of the Trojan Source exploit with hidden malware in source code, featuring a skull made of characters and a laptop displaying code

Trojan Source Vulnerability: How Hackers Hide Malware in Source Code (2025)

Nicholas Boucher and Ross Anderson, Cambridge University researchers, have discovered a new class of vulnerabilities that can be used by…

Let our experts help you reduce risk in minutes