Looking for a MDR partner? Beware, not all MDRs are the same
Are you throwing more money than you can afford into your SOC but still failing to detect and respond quickly enough to incidents? Have you suffered the impact of an incident and need to quickly ramp...
View ArticleTelefónica Invests in Nozomi Networks, a Leading Company in OT and IoT Security
Its technology guarantees advanced cybersecurity, improved operational reliability and simple IT/OT integrationThe investment, made through Telefónica Innovation Ventures, reinforces an earlier joint...
View ArticleElevenPaths Radio English #1 – Skills of a Cybersecurity Professional
Welcome to ElevenPaths Radio English! We proudly introduce our podcast about cybersecurity news presented by our Chief Security Ambassadors, now also in English. If we put ourselves in the shoes of a...
View ArticleCybersecurity Weekly Briefing July 4-10
RCE Vulnerability in F5’s BIG-IP (CVE-2020-5902) Last Wednesday a new critical Remote Code Execution vulnerability (CVE-2020-5902 CVSSv3 10) was published for F5’s Traffic Management User Interface...
View ArticleSecuring your Cloud Native Applications in AWS in the New Normal
The New Cloud Adoption Reality Yes, we are facing a New Normal, and we are living a new cloud adoption reality as well. Enterprise cloud adoption accelerates in face of Covid-19, which has radically...
View ArticleCybersecurity Weekly Briefing July 11-17
Combining Citrix vulnerabilities to steal user sessions On July 7th, Citrix published a security bulletin to correct up to 11 vulnerabilities. A few days later, a report was released with detailed...
View ArticleChallenges and Business Opportunities of Post Quantum Cryptography
If you’re reading this article from an internet browser, take a close look at the little lock at the top of the address bar. Click on it. Now click on “Certificates”. Finally, select the ‘Certificate...
View ArticleCybersecurity Weekly Briefing July 18-24
New Emotet Campaign after 5 Months of Inactivity After several months of inactivity, Emotet is back with a massive sending of reply-chain and payment emails, among others, that include malicious Word...
View ArticleConti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What...
Anyone who thinks that “retail” ransomware that infects system users and claims a ransom is a threat, may not be aware of the ransomware used against company networks. After years among us, ransomware...
View Article4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools
The No More Ransom Project celebrates its fourth anniversary today after helping over 4.2 million visitors recover from a ransomware infection and saving an estimated $632 million in ransom payments....
View ArticleCybersecurity Weekly Briefing July 25-31
BootHole: Vulnerability in GRUB2 Eclypsium researchers have discovered a buffer overflow vulnerability in the GRUB2 bootloader that could be used to execute arbitrary code during the boot process. It...
View ArticleElevenPaths Joins OpenSSF to Enhance Open Source Software Security
This new Open Source Security Foundation (OpenSSF) brings together leading technology companies such as Microsoft, Google, Red Hat and IBM, among others.It combines efforts from the Core...
View ArticleElevenPaths Radio English #2 – Secure Homeworking
It is increasingly common to see companies that offer their workers the possibility of working from home, combining it with work from the office, and even companies that are born with that vocation...
View ArticleCybersecurity Weekly Briefing August 1-7
Database of +900 Pulse Secure VPN Enterprise Servers An underground forum post has been detected showing the existence of a database containing data collected on more than 900 Pulse Secure VPN...
View ArticleElevenPaths expands its cloud security solutions portfolio with Prisma Cloud...
ElevenPaths has achieved the status of Premier Public Cloud MSSP Partner with Palo Alto Networks. ElevenPaths, Telefónica Tech’s Cybersecurity Company, has expanded its Cloud Managed Security Service...
View ArticleCybersecurity Weekly Briefing August 8-14
Hackers attempt to exploit critical vulnerability in F5 BIG-IP ADC The FBI has issued a Private Industry Notification warning that a group of Iranian hackers have been trying to exploit Big-IP ADC...
View ArticleElevenPaths presents DIARIO, the malware detector that respects users’ privacy
The tool statically scans and analyses documents without the need to identify the content of the files, thus respecting and guaranteeing their privacy.DIARIO is a new concept of malware detection that...
View ArticleCybersecurity Weekly Briefing August 15-21
EmoCrash: stopping Emotet for almost 6 months Emotet’s comeback after a 6 month-period absence has hinted that the hiatus in the malware’s operations could be due to the discovery of researcher and...
View ArticleSASE: The future of networks and security is now here
Since Gartner published their report entitled “The Future of Security Networks is in the Cloud” in August 2019, which pointed out the concept of SASE as the key to the future of networks and security,...
View ArticleCybersecurity Weekly Briefing August 22-28
Conti ransomware distributed after Trickbot Conti is a relatively new ransomware that appeared in isolated attacks in December 2019 but started to become a relevant threat in June 2020, when it...
View Article