Cyber Security Weekly Briefing 30 January – 5 February
Chrome will reject Camerfirma’s certificates Google plans to ban and remove Chrome’s support for digital certificates issued by the certification authority (CA) Camerfirma, a Spanish company that is...
View ArticleCNCF’s Harbor (cloud native registry) fixes an information disclosure bug...
On December 2nd, ElevenPaths’ CTO SRE team discovered an unauthenticated API within Harbor, a cloud native registry part of the CNCF. It is commonly used as an agnostic Docker registry and Helm...
View ArticleTriki: Cookie Collection and Analysis Tool
In July 2020, the Spanish Data Protection Agency, following the entry into force of the European General Data Protection Regulation and several consultations with the European Data Protection...
View ArticleCyber Security Weekly Briefing February 6-12
Attempted contamination of drinking water through a cyber-attack An unidentified threat actor reportedly accessed computer systems at the City of Oldsmar’s water treatment plant in Florida, US, and...
View Article26 Reasons Why Chrome Does Not Trust the Spanish CA Camerfirma
From the imminent version 90, Chrome will show a certificate error when a user tries to access any website with a certificate signed by Camerfirma. Perhaps it is not the most popular CA, but it is...
View ArticleFunctional Cryptography: The Alternative to Homomorphic Encryption for...
— Here are the exact coordinates of each operative deployed in the combat zone.— How much?— 100.000.— That is too much.— And a code that displays on screen the updated position of each and every...
View ArticleCyber Security Weekly Briefing February 13-19
Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve...
View ArticleHow to Trick Apps That Use Deep Learning for Melanoma Detection
One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this technology, like...
View ArticleCyber Security Weekly Briefing 27 February – 5 March
HAFNIUM attacks Microsoft Exchange servers with 0-day exploits Microsoft has detected the use of multiple 0-day exploits to carry out targeted attacks against on-premise versions of Microsoft Exchange...
View ArticleThe New Digital Workforce and The Risks Around Robotics Process Automation (RPA)
In recent years, many companies in different sectors have chosen to base their digital transformation on RPA – Robot Process Automation, which has facilitated the creation of hundreds of thousands of...
View ArticleNobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates
You may have noticed that most websites have a little padlock on them. If you click on it, a window will pop up stating that “the connection is secure”. Secure? What kind of secure? How secure? In...
View ArticleYour MacOS System Is Also A Target for Cybercrime – Protect It!
According to statcounter, Apple’s operating system, macOS (formerly OSX) in particular, has a market share of around 17%, making it the second most widely used desktop operating system. This makes for...
View ArticleNextDefense: The ultimate cyber defence solution for any organisation
It was on a Wednesday at 17:00h when the CIO of a potential customer, who was visiting our offices, asked for a meeting with the product team before leaving. During the session he asked many questions...
View ArticleEverything You Need to Know About SSL/TLS Certificates
What is a digital certificate? Secure Sockets Layer/Transport Layer Security digital certificate is the most widely used security protocol that enables encrypted data transfer between a web server and...
View ArticleCyber Security Mechanisms for Everyday Life
It is becoming more and more common to find in the general media news related to cyber-attacks, data breaches, privacy scandals and, in short, all kinds of security incidents. These incidents are not...
View ArticleCyber Security Weekly Briefing March 20-26
Analysis of the new cyber-espionage group SilverFish The PRODAFT Threat Intelligence team (PTI) has discovered a highly sophisticated cybercriminal group called SilverFish, which operates exclusively...
View ArticleWhat is VPN and What is It For?
VPN connections are nothing new, they have been with us for a long time, always linked to the business world. The great versatility and its different uses have made more and more people use...
View ArticleNo Pain, No Gain: Let´s Hack 2021
“No pain, no gain”, you have probably heard this on more than one occasion. An expression that is used endlessly in different environments, in a time when the body cult, sport and self-care are more...
View ArticleCyber Security Weekly Briefing April 3-9
Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files...
View ArticleA Trillion-Dollar on Offer to the Puzzle Solver
Are you a fan of mathematical puzzles? Well, here’s a lucrative one… but hard to beat! If you discover a method to crack the hashes used in Blockchain, you could get your hands on all the future...
View Article