«Excelente profesional y compañero de trabajo, Responsabe en su area y gran capacidad tecnica.»
Iniciar sesión para ver el perfil completo de Nicolás
¡Hola de nuevo!
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
o
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
Uruguay Información de contactoIniciar sesión para ver el perfil completo de Nicolás
¡Hola de nuevo!
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
o
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
764 seguidores Más de 500 contactos
Iniciar sesión para ver el perfil completo de Nicolás
¡Hola de nuevo!
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
o
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
Ver tus contactos en común con Nicolás
¡Hola de nuevo!
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
o
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
Ver tus contactos en común con Nicolás
¡Hola de nuevo!
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
o
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
Iniciar sesión para ver el perfil completo de Nicolás
¡Hola de nuevo!
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
o
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
Actividad
Iniciar sesión para ver el perfil completo de Nicolás
¡Hola de nuevo!
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
o
Al hacer clic en «Continuar» para unirte o iniciar sesión, aceptas las Condiciones de uso, la Política de privacidad y la Política de cookies de LinkedIn.
¿Estás empezando a usar LinkedIn? Únete ahora
- 🛡️| El cifrado actúa como una barrera que protege nuestra identidad y nos permite navegar por el mundo digital con confianza. 🔐¡Protegé tu…
🛡️| El cifrado actúa como una barrera que protege nuestra identidad y nos permite navegar por el mundo digital con confianza. 🔐¡Protegé tu…
Recomendado por Nicolás Correa
- Participé, junto a Agustina Perez Comenale y Mercedes Aramendia del panel “Avances y Regulaciones: construyendo un entorno tecnológico seguro y…
Participé, junto a Agustina Perez Comenale y Mercedes Aramendia del panel “Avances y Regulaciones: construyendo un entorno tecnológico seguro y…
Recomendado por Nicolás Correa
- Vivimos la segunda jornada del ejercicio que, organizado por nosotros en el #CSIRTGob, realiza amablemente la MITRE Corporation a un grupo de…
Vivimos la segunda jornada del ejercicio que, organizado por nosotros en el #CSIRTGob, realiza amablemente la MITRE Corporation a un grupo de…
Recomendado por Nicolás Correa
Licencias y certificaciones
Recomendaciones recibidas
1 persona ha recomendado a Nicolás
Unirse para verloMás actividad de Nicolás
- 🛡️| El Robo de Cuentas de WhatsApp: ¿Cómo Protegerte? 🌐En la era digital, WhatsApp es una herramienta de comunicación diaria esencial, sin…
🛡️| El Robo de Cuentas de WhatsApp: ¿Cómo Protegerte? 🌐En la era digital, WhatsApp es una herramienta de comunicación diaria esencial, sin…
Recomendado por Nicolás Correa
Ver el perfil completo de Nicolás
- Descubrir a quién conocéis en común
- Conseguir una presentación
- Contactar con Nicolás directamente
Perfiles similares
-
Fernando Blanco
. at .
UruguayConectar -
Andrés Garderes
Ing. en Computación en Anda
UruguayConectar -
Fernando Rienzi Irureta-Goyena
Analista de costos en Logicalis Latam
UruguayConectar -
Nicolás Scaglione
Co-founder & CEO Kinetix - Global Director Business Development Pyxis
UruguayConectar -
Fabiola Oshiro Monreal
S Administrative Assistant en Tata Consultancy Services
UruguayConectar -
Juan Garre
Analista at Actualred
PaysandúConectar -
Adrián Bravo Rivera
Analista en BBVA
UruguayConectar -
Paola Bianchi
Analista de Economía at Sonda Uruguay
UruguayConectar -
Pablo Salomon
Gerente Ejecutivo Tecnologías de la Información (CIO) en Banco de la República Oriental del Uruguay (BROU)
UruguayConectar -
Enrique Solaro
Departamento Tecnología en Surely S.A.
UruguayConectar -
Alejandra Arbeletche
Analista Genexus en UTE
UruguayConectar -
Ignacio Gil
Software Engineer en Matriz
UruguayConectar -
Gustavo Pinheiro
Jefe de Proyecto y Analista Funcional en ITS S.A.
UruguayConectar -
David Hahn
Managing Director en Kinetix
MontevideoConectar -
Alejandro Canavesi
CEO en Xispro - Docente en ORT
UruguayConectar -
Anthony González
AtlántidaConectar -
Esteban TALAVERA NUÑEZ
Ingeniería de preventa de soluciones de networking - CCNP R&S; CCNA Security -Instructor (ITQ) CCNA @ UTU.
UruguayConectar -
Marcos González
En busca de nuevos desafíos
UruguayConectar -
Gonzalo Damonte
Data Science
UruguayConectar -
Mariana González
Analista Programador Web at GeneXus
UruguayConectar
Ver más publicaciones
CyberCureME - Cyber Security Marketplace
BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected: Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions and judicial-related matters. By leveraging trust and fear, respectively, these attacks often involve malicious links or file attachments that lead to malware infections, which include common tactics like embedded links in emails directing users to fake websites and malicious PDF and […] The post BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Ampcus Cyber - Zero Trust Compliance Security Provider
📣Ep: 79.A of Ampcus Cyber Daily News Bulletin! 🌐 Stay tuned with us for the latest updates in cybersecurity. Stay Safe!! Check the Daily Cyber News Highlights 👇 1. Windows Quick Assist abused in Black Basta ransomware attacks. 2. Banco Santander warns of a data breach exposing customer info. 3. PoC exploit released for RCE zero-day in D-Link EXO AX4800 routers. 4. Singing River Health System: Data of 895,000 stolen in ransomware attack. 5. Microsoft fixes Windows zero-day exploited in QakBot malware attacks. 6. Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks. Your Security is our Priority. Deep Chanda Salil Sankaran Nikhil Raj Singh Jaideep Patil Prajwal Gowda Saikat Das (Sam) #AmpcusCyber #cybersecuritynews #cybercriminals #cybersecurityawareness #cybersecuritythreats #cyberscams #malwareattack #hackers #malware #databreach #informationsecurity #cybernews #Cybersecurity #cyberthreat #vulnerabilities #hacking #ransomware #ransomwareattacks #security #dataprotection
11Tech Titan Group
𝐄𝐯𝐞𝐫 𝐖𝐨𝐧𝐝𝐞𝐫 𝐇𝐨𝐰 senhasegura's 𝐏𝐫𝐢𝐯𝐢𝐥𝐞𝐠𝐞𝐝 𝐀𝐜𝐜𝐞𝐬𝐬 𝐌𝐚𝐧𝐚𝐠𝐞𝐦𝐞𝐧𝐭 𝐖𝐨𝐫𝐤𝐬? PAM is a type of information security system that protects identities that have access to or capabilities beyond those of ordinary users. It stores the credentials of privileged accounts in a highly secure password vault. In addition to storing credentials, the portal can enforce access policies. 𝐖𝐡𝐲 𝐢𝐬 𝐢𝐭 𝐢𝐦𝐩𝐨𝐫𝐭𝐚𝐧𝐭? PAM enables organizations to monitor, detect, and prevent unauthorized privileged access to sensitive information. It gives visibility into the privileged accounts and what they are doing when they are logged in; limiting the number of users who have access to administrative functions increases system security; and additional layers of protection mitigate data breaches by threat actors. Access the full article by our partner to learn more: https://shorturl.at/coJfw Reach our representative to help with your inquiries through: https://wa.link/fcqv3y #cybersecuritymalaysia #PAM #senhasegura
12Teclib'
GLPI plays a role in the judicial sector! 🧑🏻⚖️ They use GLPI for several reasons! 👇🏻 1️⃣ GLPI's asset management functions are used extensively. Track assets and manage their lifecycle within the company. 2️⃣ Thanks to GLPI plugins available in the community, payments to a third party company are automated. 3️⃣ Outsourced analysts launch tasks, associated with hourly costs, which are then processed automatically. 4️⃣ At the end of the month, just click two buttons to make payment to the company. Freeing up time to focus on activities with higher added value for the company. Do like them! Use GLPI now! https://glpi-project.org Get in touch with us: https://lnkd.in/ernxZcJc ✨GLPI, the most powerful open source service! ✨ #glpi #assetmanagement #PaymentAutomation #Productivity #CustomerService #LegalSector #AssetTracking #ProcessEfficiency #JudicialSector #GLPIServices #GLPIIndustries
12Cybersecurity Insiders
Guardians of the Cloud: The Latest Security Findings https://lnkd.in/e__HjSQv This post was originally published here by Juan Lugo . With the emergence of cloud adoption and BYOD in the workplace, companies are experiencing an overwhelming amount of data breaches. This is largely because they are not taking the appropriate steps to secure data in the cloud. As such, Bitglass conducted a survey with IT professionals from a leading cybersecurity community in order to uncover the state of security within organizations today. The results showed that the top three security priorities in the average enterprise are defending against malware, reaching regulatory compliance, and securing major apps in use. Additionally, 85% of […]
MoneyTrail Legal Services
Data Breach Alert: ShinyHunters Strikes Again, Targeting Santander and Ticketmaster Santander has acknowledged a cyber attack by the ShinyHunters hacking group, impacting both employees and customers in Spain, Chile, and Uruguay. In a separate incident, ShinyHunters has been connected to a cyber attack on Ticketmaster, where customer data is reportedly sold on the dark web. Despite the data breach, Santander has reassured the public that no transactional or online banking information was exposed during the attack. As a precautionary measure, Ticketmaster users are strongly advised to change their account passwords in light of the security breach. #SantanderCyberAttack #ShinyHunters #DataBreach #BankSecurity #CustomerProtection #TicketmasterIncident #DarkWebSale #NoDataLeakage #PasswordChangeAdvice #CyberSecurity
Intelligent Performance
Malware Monday -password stealing via HDMI cables. Security researchers have uncovered a shocking new method that hackers can use to steal sensitive information, such as passwords, by eavesdropping on HDMI cables. This discovery is extremely concerning for computer users. In a recent study, researchers at Universidad de la República in Uruguay revealed a technique that utilizes artificial intelligence to decode electromagnetic emissions from HDMI connections and reconstruct what appears on a computer screen. By capturing the electromagnetic radiation emitted by HDMI cables with readily available software-defined radio equipment and employing deep learning algorithms to analyze these captured signals, the researchers were able to reconstruct text and images from a computer display with up to 70% accuracy. This accuracy is sufficiently high for attackers to comprehend passwords, sensitive data, or even encrypted communications displayed on a screen. Moreover, the team's AI system has significantly improved on previous eavesdropping attempts, reducing character error rates by over 60 percentage points. While similar vulnerabilities were previously known for older CRT monitors, the complexity of digital signaling used by modern HDMI connections was believed to make such attacks impractical. However, this new research demonstrates that AI can overcome these obstacles, potentially putting millions of computer users at risk. Thankfully, executing such an attack demands considerable technical expertise and specialized equipment. Nevertheless, the researchers warn that government agencies or corporations could be at higher risk from sophisticated attackers. To protect against this threat, cybersecurity experts advise being vigilant about your surroundings when working with sensitive information, particularly near windows or in public spaces. Additionally, using encrypted connections and refraining from displaying passwords on external monitors connected via HDMI can help mitigate risks. If you're looking for someone to help with your cyber security and to protect against future attacks look no further than Intelligent Performance. We can help with your IT protection, Construction and support needs. Contact us today at 01293 530683 or Info@intelligentperformance.co.uk
Teclib'
3 reasons to be part of the GLPI community! 🤩 🤝 Support and knowledge sharing: access a wide knowledge base and network of helpful professionals. 💡 Influence on development: influence software evolution by suggesting plugins, reporting bugs, and collaborating with the community. 🌐 Networking and collaboration opportunities: joining offers networking, collaboration, and learning with GLPI users in various industries. Joining the GLPI community means getting help, making a difference, and connecting with others! Don't forget to follow us on our social networks to interact with us: https://linktr.ee/teclib GLPI, the most powerful open source service! https://glpi-project.org #GLPICommunity #glpi #community #itsm #opensource #GLPIServices
14Barcelona Cybersecurity Congress
#HackingVillage 🔒 "Securing the Perimeter: A Deep Dive into Attack Surfaces, Ransomware Threats, and Insurance Issues", a talk highlighting the evolving landscape of #cyberthreats in 2024. 🗣️ Marc Rivero Lopez, Lead Security Researcher at Kaspersky, will discuss the sophistication of #ransomware attacks and their extensive impact across various sectors. Uncover the significance of cyber insurance in mitigating the financial and operational toll of these threats on organizations. 🚨 Navigate the complexities of ransomware and cyber risk management! 🔗 https://lnkd.in/d7vyafza #Cybersecurity #Ransomware #CyberInsurance #BCC24
iSecurity Social
Critical PuTTY Client Vulnerability Lets Attackers Recover Private Keys: A severe vulnerability has been discovered in the PuTTY client and related components, allowing attackers to fully recover NIST P-521 private keys. The PuTTY client generates heavily biased ECDSA nonces when using the NIST P-521 elliptic curve, causing the vulnerability tracked as CVE-2024-31497. PuTTY Client Vulnerability The PuTTY client and all related components, including FileZilla, […] The post Critical PuTTY Client Vulnerability Lets Attackers Recover Private Keys appeared first on Cyber Security News. #CyberSecurity #InfoSec
1DEC Solutions Group LLC
We are sharing crucial information about a recent security vulnerability in GLPI, an open-source asset and IT management software. The identified vulnerability, tracked as CVE-2024-37148, poses a severe risk to organizations utilizing this software. This could lead to unauthorized access, data breaches, and system compromise. Stay informed and take necessary actions to secure your systems. Read the full post here: https://buff.ly/4bDs2sM. #CVE #cybersecurity #News
TechSaathi
⚠️ A new phishing campaign is spreading Poco RAT malware among Spanish-speaking sectors, including utilities and manufacturing. 🔍 Analysts note the malware's unique focus on anti-analysis and C2 activities, making it harder to detect. #CyberSecurity #InfoSec #MalwareAnalysis #ThreatHunting #CyberThreats #NetworkSecurity #VulnerabilityAssessment #Phishing #IncidentResponse #DataProtection
2iNext Global Technologies
⚠️ A new phishing campaign is spreading Poco RAT malware among Spanish-speaking sectors, including utilities and manufacturing. 🔍 Analysts note the malware's unique focus on anti-analysis and C2 activities, making it harder to detect. #CyberSecurity #InfoSec #MalwareAnalysis #ThreatHunting #CyberThreats #NetworkSecurity #VulnerabilityAssessment #Phishing #IncidentResponse #DataProtection
2The Hacker News
⚠️ Heads up! A new phishing campaign is spreading Poco RAT #malware among Spanish-speaking sectors, including utilities and manufacturing. The phishing emails use finance-related lures, posing a serious threat to corporate security. 🔍 Analysts note the malware's unique focus on anti-analysis and C2 activities, making it harder to detect. How are you strengthening your organization's email security? Share your strategies below. Read details here: https://lnkd.in/gGESefBy #cybersecurity #technology via The Hacker News.
603 comentarios
Otras personas con el nombre de Nicolás Correa en Uruguay
-
Nicolás Correa
Commercial Chief at Roro Shipping Company S.A
Uruguay -
Nicolás Correa
Director en Magix
Uruguay -
Nicolás Correa
Ingeniero en computación
Uruguay -
Facundo Nicolás Correa Sena
Montevideo
Hay 59 personas más con el nombre de Nicolás Correa en Uruguay en LinkedIn
Ver a otras personas con el nombre de Nicolás Correa