Quantcast
Channel: ElevenPaths for companies Archives - Think Big
Browsing all 166 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cyber Security Weekly Briefing 30 January – 5 February

Chrome will reject Camerfirma’s certificates Google plans to ban and remove Chrome’s support for digital certificates issued by the certification authority (CA) Camerfirma, a Spanish company that is...

View Article


Image may be NSFW.
Clik here to view.

CNCF’s Harbor (cloud native registry) fixes an information disclosure bug...

On December 2nd, ElevenPaths’ CTO SRE team discovered an unauthenticated API within Harbor, a cloud native registry part of the CNCF. It is commonly used as an agnostic Docker registry and Helm...

View Article


Image may be NSFW.
Clik here to view.

Triki: Cookie Collection and Analysis Tool

In July 2020, the Spanish Data Protection Agency, following the entry into force of the European General Data Protection Regulation and several consultations with the European Data Protection...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security Weekly Briefing February 6-12

Attempted contamination of drinking water through a cyber-attack An unidentified threat actor reportedly accessed computer systems at the City of Oldsmar’s water treatment plant in Florida, US, and...

View Article

Image may be NSFW.
Clik here to view.

26 Reasons Why Chrome Does Not Trust the Spanish CA Camerfirma

From the imminent version 90, Chrome will show a certificate error when a user tries to access any website with a certificate signed by Camerfirma. Perhaps it is not the most popular CA, but it is...

View Article


Image may be NSFW.
Clik here to view.

Functional Cryptography: The Alternative to Homomorphic Encryption for...

— Here are the exact coordinates of each operative deployed in the combat zone.— How much?­— 100.000.— That is too much.— And a code that displays on screen the updated position of each and every...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security Weekly Briefing February 13-19

​​Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve...

View Article

Image may be NSFW.
Clik here to view.

How to Trick Apps That Use Deep Learning for Melanoma Detection

One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this technology, like...

View Article


Image may be NSFW.
Clik here to view.

Cyber Security Weekly Briefing 27 February – 5 March

HAFNIUM attacks Microsoft Exchange servers with 0-day exploits Microsoft has detected the use of multiple 0-day exploits to carry out targeted attacks against on-premise versions of Microsoft Exchange...

View Article


Image may be NSFW.
Clik here to view.

The New Digital Workforce and The Risks Around Robotics Process Automation (RPA)

In recent years, many companies in different sectors have chosen to base their digital transformation on RPA – Robot Process Automation, which has facilitated the creation of hundreds of thousands of...

View Article

Image may be NSFW.
Clik here to view.

Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates

You may have noticed that most websites have a little padlock on them. If you click on it, a window will pop up stating that “the connection is secure”. Secure? What kind of secure? How secure? In...

View Article

Image may be NSFW.
Clik here to view.

Your MacOS System Is Also A Target for Cybercrime – Protect It!

According to statcounter, Apple’s operating system, macOS (formerly OSX) in particular, has a market share of around 17%, making it the second most widely used desktop operating system. This makes for...

View Article

Image may be NSFW.
Clik here to view.

NextDefense: The ultimate cyber defence solution for any organisation

It was on a Wednesday at 17:00h when the CIO of a potential customer, who was visiting our offices, asked for a meeting with the product team before leaving. During the session he asked many questions...

View Article


Image may be NSFW.
Clik here to view.

Everything You Need to Know About SSL/TLS Certificates

What is a digital certificate? Secure Sockets Layer/Transport Layer Security digital certificate is the most widely used security protocol that enables encrypted data transfer between a web server and...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security Mechanisms for Everyday Life

It is becoming more and more common to find in the general media news related to cyber-attacks, data breaches, privacy scandals and, in short, all kinds of security incidents. These incidents are not...

View Article


Image may be NSFW.
Clik here to view.

Cyber Security Weekly Briefing March 20-26

Analysis of the new cyber-espionage group SilverFish The PRODAFT Threat Intelligence team (PTI) has discovered a highly sophisticated cybercriminal group called SilverFish, which operates exclusively...

View Article

Image may be NSFW.
Clik here to view.

What is VPN and What is It For?

VPN connections are nothing new, they have been with us for a long time, always linked to the business world. The great versatility and its different uses have made more and more people use...

View Article


Image may be NSFW.
Clik here to view.

No Pain, No Gain: Let´s Hack 2021

“No pain, no gain”, you have probably heard this on more than one occasion. An expression that is used endlessly in different environments, in a time when the body cult, sport and self-care are more...

View Article

Image may be NSFW.
Clik here to view.

Cyber Security Weekly Briefing April 3-9

Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files...

View Article

Image may be NSFW.
Clik here to view.

A Trillion-Dollar on Offer to the Puzzle Solver

Are you a fan of mathematical puzzles? Well, here’s a lucrative one… but hard to beat! If you discover a method to crack the hashes used in Blockchain, you could get your hands on all the future...

View Article
Browsing all 166 articles
Browse latest View live