CyberX - The Ethical Hacking Services

CyberX - The Ethical Hacking Services

CyberX is a cybersecurity company with focus on pe*******on testing, vuln. assessments and SAST.

04/09/2024

😎 CyberX - The Ethical Hacking Services is proud to announce its sponsorship of the upcoming Security Summit in Lisbon this October.

📅 The Security Summit & Expo in Lisbon is scheduled to take place from October 8 to 10, 2024 at FIL - Feira Internacional de Lisboa. This event will focus on electronic security within smart cities, aiming to address the main challenges and innovations related to urban security and also cybersecurity.

🌐 The summit is expected to attract a diverse group of professionals, including those from both the public and private sectors, who are involved in promoting safer communities through technology.

😊 Come visit our booth at the expo to discover what we have to offer and learn how we can help secure your digital future.​

For more information: https://lnkd.in/d768sG45

30/08/2024

😍 We're thrilled to announce that CyberX - The Ethical Hacking Services has been selected for the Road 2 Web Summit! We'll be showcasing our brand new product at Web Summit 2024 in Lisbon. Stay tuned for more updates—big things are coming! 👁

Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation 27/08/2024

🚨 Google has disclosed that a security vulnerability, which was patched in a software update released last week for its Chrome browser, is being actively exploited in the wild. Identified as CVE-2024-7965, the flaw has been characterized as an inappropriate implementation bug in the V8 JavaScript and WebAssembly engine.

Read more at https://thehackernews.com/2024/08/google-warns-of-cve-2024-7965-chrome.html

Google Warns of CVE-2024-7965 Chrome Security Flaw Under Active Exploitation Google patches CVE-2024-7965, an actively exploited Chrome vulnerability, urging users to update for security.

23/08/2024

🚨Security Flaw Discovered in RFID Cards Used Globally in Hotels and Offices 🚨

Cybersecurity experts have identified a significant vulnerability in a widely-used model of RFID cards, revealing a hardware backdoor that compromises security in hotels and offices worldwide. The backdoor, found in the FM11RF08S variant of MIFARE Classic contactless cards produced by Shanghai Fudan Microelectronics since 2020, allows unauthorized access to secure areas by exploiting an unknown key. The vulnerability could be exploited within minutes of accessing the card, enabling attackers to clone the cards and bypass security measures. This discovery has raised concerns, especially as these cards are commonly used across the U.S., Europe, and India.

Further investigations uncovered a similar backdoor in the earlier FM11RF08 model, dating back to 2007, increasing the risk of widespread breaches. Researchers warn that an optimized attack could significantly accelerate the process of cracking the security key, heightening the potential threat. The discovery comes on the heels of other vulnerabilities found in RFID systems, such as the recent flaws in Dormakaba's Saflok locks, highlighting ongoing security challenges in electronic locking systems.

Source: TheHackerNews

20/08/2024

To enhance cybersecurity, it's essential to ensure that privilege levels are tailored to the specific roles and tasks of employees, preventing unnecessary access and reducing the risk of cybercrime.

👉 Stay vigilant and protect your organization!

19/08/2024

🚨Microsoft Patches Critical Windows Vulnerability Exploited by North Korea's Lazarus Group🚨

Microsoft has released a patch for a critical zero-day vulnerability that was actively exploited by the North Korean state-sponsored hacking group, Lazarus. The flaw, identified as CVE-2024-38193 with a CVSS score of 7.8, affects the Windows Ancillary Function Driver (AFD.sys) for WinSock, allowing attackers to escalate privileges and gain SYSTEM-level access.

Discovered by researchers Luigino Camastra and Milánek from Gen Digital, the vulnerability was first identified in early June 2024. The flaw allowed attackers to bypass standard security measures and access restricted system areas, posing significant risks to affected systems. Microsoft addressed the issue as part of its latest Patch Tuesday update.

The Lazarus Group leveraged this vulnerability to deploy a rootkit known as FudModule, designed to evade detection. This attack bears similarities to a previous exploitation of CVE-2024-21338, another privilege escalation flaw patched by Microsoft in February 2024. Both incidents highlight the group’s sophisticated approach, bypassing traditional security defenses by exploiting vulnerabilities in pre-installed drivers rather than introducing new, vulnerable drivers.

Cybersecurity experts continue to analyze the technical details of these attacks, noting Lazarus’ cautious use of the FudModule rootkit, which is deployed only in specific circumstances to maximize its effectiveness while minimizing detection. The recent patch by Microsoft is a critical step in mitigating these threats, but the continued vigilance of cybersecurity professionals remains essential.

Source: TheHackerNews

15/08/2024

🕰 Tick tock, the clock is ticking... and something big is coming your way!

👁We're watching everything, so you don't have to.

1/3

09/08/2024

🏖 While many companies close for vacations, leaving their offices empty and systems lightly monitored, attackers don't take breaks. Cybercriminals are often most active when defenses are down, knowing that with key personnel on vacation, any attacks may go unnoticed or take longer to respond to.

🚨 This delay in detection and response can lead to more severe breaches and greater damage, as the absence of a full team can slow down mitigation efforts. In the world of cybersecurity, vigilance is crucial, even when everyone else is on vacation.

06/08/2024

🚨Security Flaws in Windows SAC and SmartScreen Expose Systems to Undetected Threats🚨

Cybersecurity experts have uncovered critical design flaws in Microsoft's Windows Smart App Control (SAC) and SmartScreen, which could allow threat actors to gain initial access to target systems without raising any alarms. SAC, introduced in Windows 11, is a cloud-based security feature designed to block malicious and untrusted apps, checking for valid signatures when unable to predict an app's behavior. Similarly, SmartScreen, which debuted with Windows 10, uses a reputation-based approach to assess the safety of websites and downloaded apps, providing warnings only when the reputation is unclear.

Elastic Security Labs, in a report shared with The Hacker News, highlighted several techniques that attackers use to bypass these protections. One common method is using a legitimate Extended Validation (EV) certificate to sign malicious apps, a tactic seen in the recent HotPage malware distribution. Other techniques include reputation hijacking, seeding, and tampering, as well as LNK stomping—a method exploiting Windows shortcut file handling to remove security tags before checks. Despite these systems being vital for blocking common malware, researchers emphasize the importance of additional scrutiny and not solely relying on OS-native features for comprehensive protection.

Credits: thehackernews.com

03/08/2024

🚨Cryptocurrency Plummets 99% After Hacker Exploits Vulnerability to Create Millions of New Tokens🚨

The decentralized finance (DeFi) protocol Convergence, which operates on the Curve platform and focuses on yield enhancement, suffered a devastating hacker attack on Thursday, resulting in its CVG cryptocurrency plummeting to nearly zero. The hacker exploited a vulnerability in the protocol’s code to mint 58 million new CVG tokens.

Subsequently, the attacker exchanged these tokens for 60 Wrapped Ether (wETH) and 15,900 crvFRAX stablecoins using liquidity pools on Curve, according to Web3 audit firm QuillAudits. Etherscan data shows that the hacker later converted the funds into Ether (ETH) and transferred the tokens to the controversial cryptocurrency mixer Tornado Cash. The attack inflicted a loss of approximately $210,000 on the protocol, but the greater impact was felt by CVG holders as the fully diluted value (FDV) of the token plummeted from $17 million to practically zero.

As a result, CVG’s price nosedived by 99% in Curve’s liquidity pools, dropping to $0.0004. In response, Convergence has urged its users to refrain from interacting with the protocol due to security concerns. This incident highlights the critical importance of robust security measures in DeFi protocols to protect against such vulnerabilities and safeguard investor assets. The abrupt collapse of CVG serves as a stark reminder of the risks inherent in the rapidly evolving DeFi landscape.

Source: PortaldoBitcoin UOL

01/08/2024

🚨 WhatsApp for Windows Allows Python and PHP Scripts to Execute Without Warning 🚨

A security flaw in the latest version of WhatsApp for Windows allows Python and PHP scripts to execute without warning when opened by the recipient. This vulnerability, discovered by security researcher Saumyajeet Das, poses a risk primarily to software developers and power users who have Python installed on their systems. Unlike other risky file types that WhatsApp blocks, such as .EXE and .BAT, Python (.PYZ and .PYZW) and PHP (.PHP) files are not included in WhatsApp’s blocklist, making them executable directly from the messaging client.

Das reported the issue to Meta Bug Bounty Program, but the company dismissed it, stating that users are warned against opening files from unknown senders and that malware can take many forms. Despite the potential for malicious scripts to be sent to contacts or posted in chat groups, WhatsApp has no plans to add Python and PHP file types to its blocklist. Das expressed disappointment with this decision, emphasizing that blocking these file types could enhance user security and demonstrate Meta’s commitment to addressing security concerns promptly.

Credits: Bleeping Computer

31/07/2024

Join us for an exclusive live session, "Inside the Mind of an Ethical Hacker: Live Bug Bounty Insights with c4ng4c31r0" 🕵️‍♂️💻.

In this exciting event, we are honored to have João Victor, aka c4ng4c31r0, a renowned Brazilian ethical hacker and bug bounty expert. João Victor will share his experiences, strategies, and tips for finding and reporting vulnerabilities in various systems 🛡️🔍.

📅 Date: July 31
🕕 Time: 18h Brasília (BRT), 22h Lisbon (WEST)

🌟 What to Expect:
In-depth Insights: Learn from one of the best in the field as João Victor discusses his journey and techniques in ethical hacking.
Getting Started: Discover how to kickstart your own career in bug bounty hunting and cybersecurity 🚀.
AI in Cybersecurity: Hear João Victor's thoughts on the role of AI in the cybersecurity landscape 🤖🛡️.
Live Q&A: Ask your burning questions and get answers directly from an expert 🔥

This is a unique opportunity to enhance your knowledge and dive into the world of ethical hacking and cybersecurity.

Don't miss out! 📅🔔

27/07/2024

🚨 Critical Docker Engine Flaw Allows Attackers to Bypass Authorization Plugins 🚨

Docker has issued a warning about a critical flaw affecting certain versions of Docker Engine, allowing attackers to sidestep authorization plugins (AuthZ) under specific circumstances. This vulnerability, tracked as CVE-2024-41110, has a CVSS score of 10.0, indicating maximum severity.

🔍 Key Details:

Vulnerability: Bypass and privilege escalation via API request with Content-Length set to 0.

Impacted Versions: Docker Engine v19.03.x and later (if AuthZ plugins are used for access control).

Resolved in: Docker Engine versions 23.0.14 and 27.1.0 (as of July 23, 2024).

Docker's advisory highlights that this is a regression issue, initially discovered in 2018 and addressed in v18.09.1 but not carried over to subsequent versions. The flaw was identified again in April 2024 and has now been patched.

Gabriela Georgieva from Docker clarified that users not relying on AuthZ plugins and users of Mirantis Container Runtime are not vulnerable. Docker Desktop up to version 4.32.0 is also affected, but exploitation likelihood is limited.

🛡️ Mitigation:

Ensure installations are updated to the latest versions to mitigate potential threats.

A forthcoming Docker Desktop release (version 4.33) will include the fix.

This warning follows Docker's earlier efforts this year to patch flaws known as Leaky Vessels, highlighting the ongoing need for vigilance in container security.

As containers become an integral part of cloud infrastructure, it's crucial to address vulnerabilities that could allow attackers to escape container confines and access host systems. Stay updated and secure!

Source: Hackernews

22/07/2024

🚨Physical Security Alert🚨

🔓The footage shows an individual attempting to open a hotel room door from the outside using a magnet, a cord, and a lace. By maneuvering these tools and placing the magnet and lace precisely, he successfully manipulates the door lock mechanism to gain entry.

👉To protect guests, it is essential to address design vulnerabilities such as gaps beneath doors. Ensuring there is no space between the door and the floor can prevent tools from being inserted. Additionally, using advanced locking mechanisms that are resistant to magnetic manipulation, reinforcing door frames, and implementing secondary locks or security bars can significantly enhance safety.

What do you think about it? Comment below!

19/07/2024

🚨 A massive IT outage has wreaked havoc around the world, impacting major banks, media outlets, and airlines. The disruption has grounded many flights, causing long queues and delays at airports, while also affecting shops and communication services.

Both Australia's home affairs ministry and American Airlines have indicated that the outage might be connected to an issue at Crowdstrike. Australia's National Cyber Security Coordinator described the incident as a "large-scale technical outage," emphasizing there is no current evidence to suggest a cyberattack. American Airlines, the world's largest airline by passenger numbers, confirmed that a "technical issue with Crowdstrike" is affecting multiple carriers.

Affected Industries: Airlines, banks, railways, telecommunications, media outlets, and supermarkets have been hit, leading to widespread disruptions.

Global Impact: Reports of issues have emerged from the United States, Portugal, India, New Zealand, and the United Kingdom, among other places.

Technical Glitch: Initial investigations suggest the issue might be linked to a global cyber-security firm, Crowdstrike.

Crowdstrike, a company known for its antivirus software, is at the center of this incident. There are reports that a software update from Crowdstrike might have caused Windows devices to crash, leading to the global outage. The situation has severely impacted Crowdstrike's market value, with its shares plunging as much as 14% in early trading. Microsoft and other related stocks have also seen declines.

Possible Workaround Steps:
>Boot Windows into Safe Mode or the Windows Recovery Environment.
>Navigate to the C:\Windows\System32\drivers\CrowdStrike directory.
>Locate the file matching “C-00000291*.sys”, and delete it.
>Boot the host normally.

13/07/2024

🌐 In the tech world, it’s not uncommon to see a room full of hands go up when asked, "Who has Kali Linux installed?" Yet, the crowd drastically shrinks when the follow-up question is, "Who can actually hack?" This highlights a prevalent issue: many label themselves as hackers after merely installing software or completing a basic course.

👉 True hacking skills, however, require deep knowledge, continuous learning, and practical experience. It's a reminder that tools alone don’t make the craftsman; it's the mastery of their use that does.

12/07/2024

🚨Polemic topic🚨

🤖 The video showcases China's remarkable leap into the future, where robots are seamlessly replacing human workers in various industries. These advanced machines demonstrate precise and efficient operations, highlighting the country's rapid technological advancements.

🛡However, this shift towards automation raises important questions about the cybersecurity of these devices. With increasing reliance on artificial intelligence and robotics, how secure are these systems against potential cyber threats? Ensuring robust cybersecurity measures is crucial to protect sensitive data and maintain the integrity of these futuristic technologies.

What do you think about this transformation and the potential cybersecurity challenges it brings? Comment below!👇

Credits: lawrencemansour

08/07/2024

🚀 Exciting News from CyberX! 🚀

We are thrilled to announce that starting today, CyberX - The Ethical Hacking Services is expanding its operations to Canada!

😎 Joining us in this exciting journey is our new team member, Dant Viana, a Cyber Sales Specialist with over 10 years of experience in the industry. With Dant's expertise, we are ready to explore new opportunities and bring top-notch cybersecurity solutions to more companies and individuals across Canada.

🌎 Our commitment to society remains unwavering – to ensure robust cybersecurity for all. Here's to a new chapter of growth and protection! (And we're just starting...)

Welcome, Dant!

07/07/2024

📡 The U.S. military has announced a significant new initiative, the Commercial Augmentation Space Reserve (CASR), aimed at enhancing cybersecurity for satellites and space hardware amid escalating global tensions. Partnering with space development companies, this initiative focuses on fortifying American space assets against cyberattacks, which have become increasingly sophisticated and frequent. This move comes in response to past incidents, such as the 2022 cyberattack that disabled satellite broadband services, underscoring the urgent need for robust space cybersecurity measures.

🛰 A recent report by California Polytechnic State University highlights the long history of satellite hacking, dating back to the 1980s, and the catastrophic potential of such attacks on critical GPS systems. The report underscores the difficulty in updating space hardware and the resulting attractiveness of these targets to malicious actors. With advancements like the ICARUS system, which simulates millions of attack scenarios, the U.S. military's focus on preemptive defense strategies is crucial. As General Stephen Whiting of U.S. Space Command emphasizes, understanding and anticipating these threats is vital in protecting national and global security in this new era of space exploration and conflict.

🚨 An intriguing aspect of this cybersecurity landscape is whether organizations like NASA or SpaceX conduct pe*******on testing (pentesting) on their satellites to identify and mitigate vulnerabilities. As of now, it remains unclear whether such practices are routinely performed or to what extent they are integrated into the development and deployment processes of these critical assets. This mystery adds another layer of complexity to the challenge of ensuring space cybersecurity, highlighting the need for transparency and collaboration across all entities involved in space exploration and technology.

04/07/2024

🚨 Elon Musk expresses deep concerns about the potential dangers of artificial intelligence. Musk highlights the rapid advancements in AI technology, warning that without proper regulation and oversight, AI could pose existential risks to humanity.

👾 He emphasizes the importance of proactive measures to ensure AI development aligns with human values and safety standards.

What do you think about it? Comment bellow!

30/06/2024

🔍 Top Search Engines for Pe*******on Testers! 🔍

As cybersecurity professionals, having the right tools at our fingertips is crucial. Equip yourself with these powerful resources to enhance your security assessments and stay ahead in the game!

Credits: Cyber Threat Intelligence ®

26/06/2024

🤖 Imagine a future where robots like the one in this video can be hacked. This robot, designed to perform complex tasks with precision, could be turned against us. The consequences of such a scenario could be dire: from compromised security and privacy to potential physical harm.

👾 As we advance technologically, it's crucial to consider the implications of cyber threats and work towards safeguarding our robotic systems against malicious attacks.

👉 How do you think we can prepare for and prevent such possibilities?

24/06/2024

🎉Happy São João to all our esteemed clients and partners!🎉

🎇 As we celebrate this vibrant festival in Porto, we extend our heartfelt thanks for your continuous support and collaboration. May this joyous occasion bring you happiness, prosperity, and countless moments of celebration.

22/06/2024

🚀 Professor Leonardo Vidal came directly from Brazil to honor our stand at DDC Samsys 2024. He shared insights from his research on cybersecurity in IoT devices, highlighting their vulnerabilities and the urgent need for robust security measures. He emphasized the critical nature of safeguarding these technologies, and that's precisely why we're here—to offer our expertise and support.

🤝 This marks the beginning of a promising new partnership, aimed at enhancing cybersecurity in critical sectors and ensuring a safer digital future.

20/06/2024

🚨The video "Slaughterbots" presents a chilling reality where AI-powered drones autonomously decide life and death based on profiles. This video unveils a haunting glimpse into a world governed by advanced AI weaponry, showcasing drones with automated recognition capabilities and the potential to carry explosives.

🎯The scenario depicted emphasizes the terrifying potential of such technology, raising crucial ethical and security concerns about the future of autonomous weapons. What do you thing about it? Comment bellow!👇

13/06/2024

🌐 In a captivating video, a man demonstrates the remarkable capabilities of a robot arm enhanced with AI technology. According to him, the arm interprets neural signals from the man's brain, translating his intentions into precise movements. This innovative use of AI showcases its transformative potential in the medical field, offering new hope for individuals with disabilities.

💻 By interpreting complex neural signals, AI-powered prosthetics can significantly improve the quality of life for amputees and those with motor impairments, enabling more natural and intuitive control. However, this breakthrough also highlights the critical importance of cybersecurity.

🔒 As these advanced devices become more integrated with neural and digital networks, protecting them from cyber threats is paramount. Ensuring robust security measures will be essential to safeguard user data and prevent potential malicious interference, ensuring the safe and reliable operation of these life-changing technologies.

Credits: lawrencemansour

12/06/2024

🏅 We're thrilled to share a glimpse of our stand at the DDC Samsys - Consultoria e Soluções Informáticas 2024 event, which took place last Friday!

🎥Check out the video to see some highlights from our stand. Thank you to everyone who visited and contributed to making this event a memorable experience!

😊 Also, we'd like to say thank you to Hacker Rangers and 2Business Serviços for their support!

Photos from CyberX - The Ethical Hacking Services's post 11/06/2024

🎉Last Friday, we had the pleasure of attending DDC Samsys - Consultoria e Soluções Informáticas 2024. It was an amazing event filled with numerous opportunities for networking and inspiring talks. We are extremely grateful and would like to extend our heartfelt thanks to Ruben Soares, Samuel Soares, Helder Mesquita, and all the Samsys collaborators for organizing such an awesome event.

🍿🍬Our stand was extremely busy, with lines of people eager to talk to us and enjoy the free, delicious popcorn that filled the entire event with its delightful aroma and our exclusive candy.

🤝Additionally, we want to thank our partners, Hacker Rangers and 2Business Serviços, for their invaluable collaboration. Hacker Rangers contributed significantly with their expertise in cybersecurity awareness, while 2Business Partner enriched the event with their focus on people development and recruitment.

😎Expect to see us again in 2025 with amazing news!

10/06/2024

🤔 Curious why hackers are focusing on the Paris Olympics? The stakes are higher than ever with nation-states in the mix. Click to read more! https://www.cyberx.pt/post/discover-why-hackers-are-eyeing-the-paris-olympics?lang=en

Quer que o seu negócio seja a primeira Serviço De Informática E Eletrônicos em Porto?
Clique aqui para solicitar o seu anúncio patrocinado.

Vídeos (mostrar todos)

🕰 Tick tock, the clock is ticking... and something big is coming your way! 👁We're watching everything, so you don't have...
🚨Security Flaws in Windows SAC and SmartScreen Expose Systems to Undetected Threats🚨Cybersecurity experts have uncovered...
🚨Physical Security Alert🚨 🔓The footage shows an individual attempting to open a hotel room door from the outside using a...
🚨Polemic topic🚨🤖 The video showcases China's remarkable leap into the future, where robots are seamlessly replacing huma...
LiveX #2 - Inside the Mind of an Ethical Hacker
📡 The U.S. military has announced a significant new initiative, the Commercial Augmentation Space Reserve (CASR), aimed ...
🚨 Elon Musk expresses deep concerns about the potential dangers of artificial intelligence. Musk highlights the rapid ad...
🤖 Imagine a future where robots like the one in this video can be hacked. This robot, designed to perform complex tasks ...
🚀 Professor Leonardo Vidal came directly from Brazil to honor our stand at DDC Samsys 2024. He shared insights from his ...
🚨The video "Slaughterbots" presents a chilling reality where AI-powered drones autonomously decide life and death based ...
🌐 In a captivating video, a man demonstrates the remarkable capabilities of a robot arm enhanced with AI technology. Acc...
🏅 We're thrilled to share a glimpse of our stand at the DDC Samsys - Consultoria e Soluções Informáticas 2024 event, whi...

Endereço


Rua Do Tronco 375, São Mamede De Infesta E Senhora Da Hora
Porto
4465-275

Horário de Funcionamento

Segunda-feira 09:00 - 18:00
Terça-feira 09:00 - 18:00
Quarta-feira 09:00 - 18:00
Quinta-feira 09:00 - 18:00
Sexta-feira 09:00 - 18:00

Outra Empresa de tecnologia de informação em Porto (mostrar todos)
Infobeira Infobeira
Porto
Porto, 4000

Portal de Informação, Empresas, Emprego, Formação, Diversos, Imóveis, Automóveis Eventos, Conc

Strongstep - Innovation in software quality Strongstep - Innovation in software quality
Via Do Castelo Do Queijo, 395, Piso/1, Loja R8 E 24
Porto, 4100-429

Company specialized in Software Engineering, Information Security and Service Management

Bi.up solutions Bi.up solutions
Porto

Step up your future

Gestora Comercial da Vodafone Gestora Comercial da Vodafone
Porto

vem fazer parte da nossa comunidade vodafone. usufrui de tudo aquilo que temos para te oferecer.

TopTech TopTech
Porto

Design & Build 🎨 Criando marcas que contam histórias visualmente! ✨ Transformamos ideias em designs impactantes de logos, web pages, branding e ilustrações. 💼💻🖌️ ✉️ Entre em con...

EinsteinHertz EinsteinHertz
Porto, 4000-069

Welcome to one of the largest technology companies in the world, which is innovating and investing in its future, not least because, "The future is now".

Dream Up Dream Up
Porto

Brands & Companies We are committed to innovating through different services in the luxury and high matket: @webssential.pt @katured.eu @savart.pt

SecuritySide SecuritySide
Office Park, Torre A, Avenida De Sidónio Pais N. º 153 3ºandar
Porto, 4100-467

We provide information security consulting, services and design tailored solutions

MGVsi MGVsi
R. D. Pedro V 369 Trofa
Porto, 4785-306

Somos uma empresa na área das Soluções Informáticas e Software de Gestão no mercado empresarial.

oneclick.pt oneclick.pt
Porto

A equipa Oneclick.pt tem o propósito de desenvolver soluções competitivas e adaptadas.

360 ELITE TGEI 360 ELITE TGEI
Rua Paulo Da Gama 629
Porto, 4150

A 360 ELITE TGEI é um projeto de desenvolvimento tecnológico empresarial e industrial. As soluçõ

Gig Gig
Porto

A Gig é a aplicação que junta prestadores de serviços aos seus clientes. Se forneces serviços c