Category Archives: Cybersecurity

AI Becomes a Key Player in Spam and Scam Email Campaigns

More than half of today’s spam and malicious emails are now being generated by artificial intelligence, according to new findings from cybersecurity firm Barracuda, in collaboration with Columbia University and the University of Chicago. The team analyzed millions of spam messages intercepted by Barracuda between February 2022 and April 2025. By applying specialized detection tools, […]

What is Setoolkit?

Setoolkit or SET is an open-source framework for performing pentesting focused on Social Engineering attacks. Social engineering is the art of obtaining information from users through manipulating people. Therefore, in every security audit of companies, it is extremely important to audit the weakest point in cybersecurity within companies: the employees. The company Trusted Sec developed […]

Ngrok + Setoolkit Kali Linux 2020 – Phishing Attack

In this tutorial, I’m going to explain how to do phishing. But before that, I will explain the following: What is Phishing in cybersecurity?: https://www.nubetia.com/que-es-phishing/ What is Ngrok and how to install it?: https://www.nubetia.com/que-es-ngrok/ What is Setoolkit?: https://www.nubetia.com/que-es-setoolkit/ Now that we know what phishing, ngrok, and setoolkit are, we will proceed to perform a phishing attack on […]

How to Install Kali Linux on Mac 2020

First of all, we need to make sure that Virtual Box for Mac is installed, which you can download at the following link: https://www.virtualbox.org/wiki/Downloads Go to the following link: https://www.offensive-security.com/kali-linux-vm-vmware-virtualbox-image-download/#1572305786534-030ce714-cc3b Download Kali Linux for Virtual Box; I select the 64-bit version because that corresponds to my machine. Once downloaded, open the file and click on […]

Setting Up an Environment Variable in AWS Elastic Beanstalk

Step 1: Access Elastic Beanstalk Log in to your AWS console and navigate to Elastic Beanstalk. Select your application. Step 2: Select Your Environment Choose the specific environment of your application where you want to add the environment variable. Step 3: Environment Configuration On the environment summary page, locate the “Configuration” section. Step 4: Modify […]