Skip to content
  • Home
  • Abous Us
  • Services
  • NIS 2
  • Blog
  • Contact
  • English
    • Español
    • Euskara
Request a Free Call

Blog category

Cybersecurity

Phishing con IA: descubre cómo ciberdelincuentes usan generadores web para crear páginas falsas y robar credenciales. Protégete con soluciones avanzadas.
La nueva ola de phishing con IA: cómo los atacantes usan generadores de páginas web…
CybersecuritySeptember 17th, 2025
IA agentiva en SOC permite a Cisco mejorar la detección y respuesta ante amenazas en tiempo real, revolucionando la ciberseguridad empresarial.
Cómo Cisco impulsa el SOC con IA agentiva para responder a amenazas en tiempo real
CybersecuritySeptember 15th, 2025
NPM packages compromised in a major supply chain attack impacting 2 billion downloads. Learn how to protect your software supply chain.
20 Popular NPM Packages Compromised: A Wake-Up Call for Open-Source Security
CybersecuritySeptember 10th, 2025
XS-GroK AI attacks are redefining cybercrime as hackers use AI to bypass detection. Discover how to protect your systems from evolving threats.
Cybercriminals Exploit XS-GroK AI to Evade Detection in Sophisticated Attacks
CybersecuritySeptember 8th, 2025
XS Grok AI vulnerabilities are being exploited by cybercriminals, exposing enterprises to major risks. Learn how to protect your systems now.
Cybercriminals Exploit XS Grok AI: A New Threat to Enterprise Security
CybersecuritySeptember 5th, 2025
AI-powered tools are being exploited by hackers, turning defenders into threats. Discover how to protect your systems from AI-based attacks.
AI-Powered Tools in Cybersecurity: When Defenders Become Attackers
CybersecuritySeptember 3rd, 2025
EchoLink amenaza zero-click usa IA para vulnerar dispositivos sin clic. Descubre cómo protegerte con soluciones avanzadas de ciberseguridad.
EchoLink: La amenaza zero-click potenciada por IA que pone en jaque la ciberseguridad
CybersecuritySeptember 1st, 2025
AI-powered malware marks a new era in cyber threats. Discover how it works, its risks, and how to protect your business effectively.
AI-Powered Malware: The Next Evolution in Cyber Threats Has Arrived
CybersecurityAugust 29th, 2025
AI-powered ransomware is revolutionizing cyberattacks. Learn how it works, why it's dangerous, and how to defend your business today.
The Rise of AI-Powered Ransomware: A New Era in Cybersecurity Threats
CybersecurityAugust 27th, 2025
Inteligencia artificial en ciberseguridad: descubre cómo puede ser una poderosa herramienta y una amenaza en la protección digital empresarial.
Inteligencia artificial en ciberseguridad: aliado y amenaza en la nueva era digital
CybersecurityAugust 25th, 2025
12345…
67891011121314151617181920212223242526272829303132333435
36→

Questions? Reach us
Monday – Friday from 8 am to 5 pm

+34 747 424 503

Request for quote

Company

  • About Us
  • Services
  • Blog
  • Contact
  • Cookie Policy (EU)
  • Legal Notice

Services

  • Cybersecurity
  • AI Services
  • AR & VR Development
  • Web 3.0 Development
  • App Design & Development
  • Cloud Development
  • Web Design & Development

Connect

Hodeitek's Facebook Page
Hodeitek's Instagram
Hodeitek's TikTok
Hodeitek's Twitter / X
Hodeitek's Linkedin Page
© 2023 – Hodeitek. All Rights Reserved.
Privacy Policy
Terms & Conditions
Legal Notice
Go to Top
Hodeitek | Cybersecurity, AI & Digital Services
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}

Book a phone consultation!

Got questions? Ideas? Fill out the form below & our specialist will contact you.

  • Home
  • Abous Us
  • Services
  • NIS 2
  • Blog
  • Contact
  • English
    • Español
    • Euskara
Book a consultation