New report: Twitter botnets detection in sports event
We all know that a botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform DDoS attacks, steal data, send spam and allows the...
View Article#CyberSecurityReport18H2: our new periodic report on cybersecurity
Currently, there are a number of reports addressing trends and summaries on security. However, at ElevenPaths we want to make a difference. Our Innovation and Labs team has just launched an own...
View ArticleThe post-quantum future is around the corner and we are still not prepared
Every year we have more powerful computers with a higher calculation capacity, is that fact good or bad? Think twice before giving an answer. It depends. Because if global information security is...
View ArticleGSMA IoT Security Champion: Award to our IoT Security team
We have a lot to be happy about! Our IoT Security team, dedicated to cybersecurity specialized in the increasingly relevant world of the Internet of Things, has received a well-deserved award for its...
View ArticleCarrier Level Immutable Protection (CLIP): secure and trusted technology to...
A year ago, we were signing our partnership agreement with Rivetz, where we set the stage for the creation of a new decentralized model to enhance data security and management. Currently, we are in a...
View ArticleWhy you are late delivering all your projects and what you can do to address it
Anyone who causes harm by forecasting should be treated as either a fool or a liar. Some forecasters cause more damage to society than criminals. —Nassim Taleb, The Black Swan, 2007 In 1957, the...
View ArticleYour feelings influence your perception of risk and benefit more than you...
Security is both a feeling and a reality —Bruce Schneier Daniel Gardner starts his book The Science of Fear with the shocking history of US September 11 attacks: And so in the months following the...
View ArticleA government is known by the Apple data it requests
Sometimes, governments need to be underpinned by huge corporations to carry out their work. When a threat depends on knowing the identity or gaining access to a potential attacker or a victim in...
View Article#CyberSecurityReport19H1: 45,000 apps removed from Google Play, 2% of them...
Currently, there are a number of reports addressing trends and summaries on security. However, at ElevenPaths we want to make a difference. Our Innovation and Labs team has just launched another...
View ArticleUncovering APTualizator: the APT that patches Windows
By the end of June 2019, we assisted to an incident were a high number of computers had started to reboot abnormally. In parallel, Kaspersky detected a file called swaqp.exe, which apparently was not...
View ArticleGoogle report 17% of Microsoft vulnerabilities. Microsoft and Qihoo, 10%
Who finds more vulnerabilities in Microsoft products? What percentage of vulnerabilities are discovered by Microsoft, other companies or vulnerability brokers? How many flaws have unknown discoverers?...
View ArticleWe Announce Our Digital Operation Centers, Where All Our Digital Services Are...
The Telefónica Cybersecurity Unit holds its VII Security Innovation Day, under the motto ‘Guards for Digital Lives.’With speakers such as Chema Alonso, Pedro Pablo Pérez, Julia Perea and Ester...
View ArticleDownload for Free Our New Book: ‘Irrational Decisions in Cybersecurity: How...
In the transmedia universe of Blade Runner, replicants are artificial human beings manufactured by bioengineering by Tyrell Corporation. They are physically indistinguishable from a human, except for...
View ArticleOur Telegram channel CyberSecurityPulse has already a webpage
Our Telegram channel CyberSecurityPulse has exceeded all our expectations: it already has more than 3000 subscribers. Considering it is a Telegram channel in Spanish addressing cybersecurity news not...
View Article#CyberSecurityReport19H2: Qihoo is the company that most collaborates in the...
Currently, there are a number of reports addressing trends and summaries on security. However, at ElevenPaths we want to make a difference. Our Innovation and Labs team has just launched another...
View ArticleElevenPaths recognized by Check Point Software Technologies as a CloudGuard...
Organizations are used to dealing with cybersecurity incidents on their own networks, but new risks and threats aimed at the public cloud mean that organizations need to take steps to bake in security...
View ArticleTheTHE: The Threat Hunting Environment, our tool for researchers
A given IOC comes to your hands, for instance a hash, URL, IP or suspicious domain. You need to find out some basic information. Is it malware? Is it in any repository? Since when? Whois? Source...
View ArticleThe Telco Security Alliance Bolsters Threat Detection Capabilities Through...
Dallas, Singapore and Madrid, February 18th, 2020 – The Telco Security Alliance today announced new collaborative efforts designed to further enhance the ability to detect and eliminate threats from...
View ArticleElevenPaths at RSA Conference 2020
Once again, we return to the RSA Conference, the reference event in the cybersecurity sector. From February 24 to 27 we will be presenting our proposal under the claim Humanizing Security. Three days...
View ArticleWhat differential privacy is and why Google and Apple are using it with your...
In order to customize their products and services and offer increasingly better features that make them more valuable and useful, companies need to know information about their users. The more they...
View Article