David García Where does ransomware attack? Three main pillars It all starts with a tweet from a researcher (Allan Liska from RecordedFuture) announcing that he is compiling a list of vulnerabilities currently being exploited by organised groups in...
David García What’s new in the OWASP 2021 ranking? OWASP, the foundation focused on web application security, has recently updated its ranking of the most prominent risks. Let’s take a look at the new reorganisation of the top,...
Raúl Hernáinz Ortega Data as a secure asset Data Management Summit as a preamble We are approaching one of the events where Telefónica will be present, and not only present, but also participating with its best professionals. An...
Félix Brezo Fernández The Work of a Cyber Intelligence Unit in The Context Of Incident Response Besides the work carried out by our colleagues in the forensic analysis, malware analysis or Threat Hunting teams, which we have reviewed in the articles in this series associated...
Telefónica Tech Cyber Security Weekly Briefing 18-24 September Malware campaign using TeamViewer on websites under IIS Malwarebytes researchers have observed a malware distribution campaign since the beginning of September that makes use of previously compromised pages running on Microsoft’s...
Diego Samuel Espitia If you own any Apple devices, run to update them On September 13, Apple surprised its users with a system update on iPhone, iWatch, iPad and macOS, something that doesn’t happen very often and less often comes with an...
Víctor José González Arcos DFIR services in a ransomware incident response As we saw in the first post of the series, the IR (incident response) process in case of attacks using ransomware is fundamental, relying on the work of several...
Cristina del Carmen Arroyo Siruela The human factor: a key element of cyber security When it is said that a server needs to be bastioned, cybersecurity personnel have an idea of what it is and what it consists of. But what about securing...
Bernardo Campillo Telefónica Tech at the top of the IoT and Big Data podium Today we want to revisit with you some good news that we received in mid-June, a little before the holiday season in July and August, a little before summer,...
Diego Samuel Espitia PackageDNA Our Development Package Analysis Framework That Made Its Debut at Blackhat After several months of research and development, during the BlackHat USA 2021 Arsenal event, you saw our deep analysis tool for development packages called PackageDNA, in the talk “Scanning...
Innovation Marketing Team Empowering women in entrepreneurship: 10 female – led startups in Germany In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
ElevenPaths A Technical Analysis of the Cobalt phases, a nightmare for a bank’s internal network A few days ago, a key member from a group of attackers known as Cobalt/Carbanak (or even FIN7 for some of them) was arrested in Alicante. This group has...
ElevenPaths Squeezing the numbers and facts of Google’s annual Android security report Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...