ElevenPaths Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security? The pandemic has accelerated the transition to a digital life, and with it, cyber-attacks against users and businesses have risen. The most frequent attack, which is the most common...
ElevenPaths Top 4 Programming Languages for Beginners Have you set yourself new challenges this year but don’t know where to start? How would you like to become an expert in programming? We know that, at first,...
ElevenPaths Cybersecurity Weekly Briefing August 22-28 Conti ransomware distributed after Trickbot Conti is a relatively new ransomware that appeared in isolated attacks in December 2019 but started to become a relevant threat in June 2020, when...
Gabriel Álvarez Corrada 5G Connectivity and its Impact on Industry 4.0: Maturity and Evolution One of the factors that indicates the maturity of some branches of technology is the incorporation of improvements as this technology evolves, which are different from those considered at...
ElevenPaths Cyber Security Weekly Briefing April 3-9 Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files under...
ElevenPaths No Pain, No Gain: Let´s Hack 2021 “No pain, no gain”, you have probably heard this on more than one occasion. An expression that is used endlessly in different environments, in a time when the body...
ElevenPaths Cybersecurity and Business: ElevenPaths at the RSA Conference 2020 We are back from the RSA Conference 2020, the year when the standard ‘humanization of technology’ has been set within the sector. We already predicted it last year with our commitment under...
ElevenPaths Expanding Neto capabilities: how to develop new analysis plugins In previous posts we have introduced Neto as a browser extension analyzer. The first version we released, 0.5.x included a CLI, a JSON-RPC interface and could be used directly...
ElevenPaths Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security? The pandemic has accelerated the transition to a digital life, and with it, cyber-attacks against users and businesses have risen. The most frequent attack, which is the most common...
ElevenPaths Top 4 Programming Languages for Beginners Have you set yourself new challenges this year but don’t know where to start? How would you like to become an expert in programming? We know that, at first,...
Gabriel Bergel ¿Ransomware in Pandemic or Ransomware Pandemic? No one imagined what could happen in the field of cyber security during the Covid-19 pandemic. Perhaps some colleagues were visionary, or others were basically guided by the statistics...
Diego Samuel Espitia TypoSquatting: Using Your Brain to Trick You Our brain capacity is outstanding but it also creates some cybersecurity risks. Discover why in this post.
#CyberSecurityReport18H2: our new periodic report on cybersecurityElevenPaths 14 January, 2019 Currently, there are a number of reports addressing trends and summaries on security. However, at ElevenPaths we want to make a difference. Our Innovation and Labs team has just launched an own cybersecurity report, summarizing the most significant information from the second semester 2018. The report’s philosophy is providing a global, targeted and useful vision on the most relevant data and facts on cybersecurity. It is addressed to cybersecurity professionals and enthusiasts, in a simple and visually-appealing format. Let’s go over some of the data from this first edition, that will be continued and, without a doubt, further improved. Nowadays there is a flood of information on cybersecurity. Nevertheless, it does not mean that this flood of information is correctly understood and analyzed, thus such information is not properly exploited to improve processes and be less vulnerable. Lack of information is as harmful as its excess. To be updated and inform people is not enough, but it is also necessary to analyze and be able to prioritize, learn what is important and why. No matter if you are a cybersecurity professional or enthusiast, it is important that you can follow the rhythm of the relevant news on cybersecurity: What are the most relevant facts currently happening? What is the current outlook? How security problems, vulnerabilities and attacks are evolving? It is necessary to summarize without losing depth. Given all the above, this report aims to summarize latest information on cybersecurity (ranging from security on mobile phones to cyber risk, from the most relevant news to the most technical ones and the most common vulnerabilities), while covering most aspects of the field, in order to help the readers to understand the risks of the current outlook. This way, the readers will be provided with a tool to understand the state of cybersecurity from different approaches, so they will be able to find out its current state as well as to determine short-term trends. The information here presented is mostly based on the collection and synthesis of internal data that have been contrasted with public information from sources considered to be of quality. In the following lines you will find several important points extracted from the report. #CyberSecurityReport18H2: Some data The new security features of the last iOS version are focused on improving the user experience regarding passwords, specifically their better management and use. Over the second semester 2018, a total of 125 vulnerabilities for iOS were made public, 56% of them with a 7/10 severity or higher. Consequently, iOS gathers 1496 vulnerabilities from 2007. Over the same period, a total of 173 vulnerabilities for Android were made public, 18% of them with a 7/10 severity or higher. Consequently, iOS gathers 1950 vulnerabilities from 2009. 11% of iPhones execute an iOS earlier than 11. In case of Android, half of the current devices working with Android execute an unsupported version. Around a third of the malicious applications detected were available on Google Play between 22 and 42 days. The total average (time malicious applications were published) is 47.45 days. Most of the security problems detected from our clients are information leakages through sensitive files and metadata, as well as the poor implementation of HTTP headers aimed to protect from attacks. A European company needs an average of almost 3 days to solve a malware threat. The fastest are insurance companies (they need less than 2 days), while the slowest are food production companies (more than 4 days). In Spain, entertainment industry needs up to 10 days to neutralize a malware threat. Gamarue and Conficker remain the most popular malware threats in Europe. We invite you to read the whole report: ElevenPaths #Cibersecurityreport18H2 (ENG) from ElevenPaths We look forward to seeing you again in our next #CyberSecurityReport18H2. Innovation and Labs (ElevenPaths) www.elevenpaths.com 2019 Won’t Be the Year When Quantum Computers Replace the Cryptography That We All UseDetected an extension in Chrome Web Store, active from February, that steals credit cards
ElevenPaths Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security? The pandemic has accelerated the transition to a digital life, and with it, cyber-attacks against users and businesses have risen. The most frequent attack, which is the most common...
ElevenPaths Top 4 Programming Languages for Beginners Have you set yourself new challenges this year but don’t know where to start? How would you like to become an expert in programming? We know that, at first,...
ElevenPaths A Trillion-Dollar on Offer to the Puzzle Solver Are you a fan of mathematical puzzles? Well, here’s a lucrative one… but hard to beat! If you discover a method to crack the hashes used in Blockchain, you...
ElevenPaths Cyber Security Weekly Briefing April 3-9 Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files under...
ElevenPaths No Pain, No Gain: Let´s Hack 2021 “No pain, no gain”, you have probably heard this on more than one occasion. An expression that is used endlessly in different environments, in a time when the body...
ElevenPaths What is VPN and What is It For? VPN connections are nothing new, they have been with us for a long time, always linked to the business world. The great versatility and its different uses have made...