Cybersecurity Weekly Briefing October 10-16
Coalition of IT Companies Tries to Eliminate TrickBot Botnet A technology business conglomerate including Microsoft, FS-ISAC, ESET, Lumen’s Black Lotus Labs, NTT, and Symantec, have participated in...
View ArticleSteps to move security solutions forward in the face of current world challenges
Palo Alto Networks founder Nir Zuk recently addressed the Telefónica Global Security Summit with some thoughts to share on the direction of security and implications of the COVID-19 pandemic. Many...
View ArticleElevenPaths approaches the cyber security paradigm shift and the new era’ s...
Telefónica Tech’s cyber security company is holding its 8th Security Innovation Days, this time in a virtual format and extending from one to three half-days, on October 20th, 21st and 22nd.Among the...
View ArticleCybersecurity Weekly Briefing October 17-23
New banking trojan called Vizom IBM Security Trusteer’s research team has published a report analysing the new “Brazilian family” banking Trojan called Vizom. This malicious software uses similar...
View ArticleCybersecurity and Business in the New Era: Security Innovation Days 2020 (Day 1)
First day of the Security Innovation Days 2020 completed with more than 1500 people connected from all over the world. If you missed the first day of our cybersecurity innovation event, don’t you...
View ArticleNew Capabilities for the Future of Cybersecurity: Security Innovation Days...
Second day of the Security Innovation Days 2020, focusing on the new capabilities we have acquired as a cybersecurity company from Telefónica Tech. A few weeks ago, we announced the purchase of two...
View ArticleInnovation and New Cybersecurity Tools: Security Innovation Days 2020 (Day 3)
This was the 8th edition of the Security Innovation Days 2020 so far. Three intense days in which innovation in cybersecurity and the digital transformation have been the essence of the event. For the...
View ArticlePay When You Get Infected by Ransomware? Many Shades of Grey
The Internet is full of articles explaining why ransomware should not be paid. And they are probably right, but if you don’t make a difference between the type of ransomware and who is affected, the...
View ArticleApproaching Cybersecurity in Industry 4.0: The Age of Connected Machines
Don’t run away yet! This era is not about machines enslaving humanity (at least, not yet…) but about the introduction of elements (IOT devices, cloud environments, IA, Big Data, SIEM, IDS…) into...
View ArticleAre You Crypto-Agile to Respond Quickly to Changing Cyberthreats?
A business is considered agile if it is able to respond quickly to market changes, adapt to maintain stability. However, without cryptography there is no security and without security there is no...
View ArticleCybersecurity Weekly Briefing October 24-30
Critical vulnerability in Hewlett Packard Enterprise SSMC Hewlett Packard Enterprise has fixed a critical authentication evasion vulnerability (CVE-2020-7197, CVSS 10) affecting its StoreServ...
View ArticleTelefónica, Gradiant and Incibe Improve Companies’ Cyber Security
The agreement boosts knowledge transfer to the private sectorTEGRA continues on the path to consolidate Galicia’s position as a major player in the European field of cyber security Telefónica,...
View ArticleZoomEye: Extending TheTHE With More Plugins
Those who follow the developments carried out by the Innovation and Laboratory team will be familiar with our theTHE platform, which specialises in Threat Hunting, IoC analysis and is very useful...
View ArticleHomeworking and Pandemics: a Practical Analysis on BlueKeep Vulnerability in...
“It is not the strongest of the species that survives, not the most intelligent that survives. It is the one that is the most adaptable to change”.Charles Darwin One of the greatest and most rapid...
View Article¿Ransomware in Pandemic or Ransomware Pandemic?
No one imagined what could happen in the field of cyber security during the Covid-19 pandemic. Perhaps some colleagues were visionary, or others were basically guided by the statistics of recent years...
View ArticleElevenPaths Radio English #4 – Privacy and Personal Data Protection
Privacy and personal data protection are two of the greatest concerns today due to the large amount of information leaking out to the media every day. Practically all big companies today have large...
View Article5G Connectivity and its Impact on Industry 4.0: Maturity and Evolution
One of the factors that indicates the maturity of some branches of technology is the incorporation of improvements as this technology evolves, which are different from those considered at the...
View ArticleCybersecurity Weekly Briefing November 7-13
Links between Vatet, PyXie and Defray777 Researchers from Palo Alto Networks have investigated the families of malware and operational methodologies used by a threat agent that has managed to go...
View ArticleRock, Paper, Scissors and Other Ways to Commit Now and Reveal Later
Have you ever played rock, paper, scissors? I bet you have. Well, let’s put the tin lid on it: how would you play through the phone? One thing is clear: the first one to reveal his choice loses for...
View ArticleThe Challenge of Online Identity (I): Identity Is the New Perimeter
We often find ourselves in situations where we are faced with a mission and, as the mission goes on, we realise that the first choices we made were not good. At that point, we have two options: start...
View Article