Franco Piergallini Guida How to Trick Apps That Use Deep Learning for Melanoma Detection One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
ElevenPaths Cyber Security Weekly Briefing February 13-19 Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve years. The flaw,...
ElevenPaths Cybersecurity Weekly Briefing 6-12 June Enel and Honda Compromised by Snake Ransomware Italian energy corporation Enel and Japanese automotive giant Honda were hit last weekend by ransomware attacks that would have impacted on their IT...
ElevenPaths Cybersecurity Weekly Briefing October 24-30 Critical vulnerability in Hewlett Packard Enterprise SSMC Hewlett Packard Enterprise has fixed a critical authentication evasion vulnerability (CVE-2020-7197, CVSS 10) affecting its StoreServ Management Console (SSMC) storage management software. HPE...
Franco Piergallini Guida How to Trick Apps That Use Deep Learning for Melanoma Detection One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
ElevenPaths Cyber Security Weekly Briefing February 13-19 Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve years. The flaw,...
Gonzalo Álvarez Marañón Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data — Here are the exact coordinates of each operative deployed in the combat zone.— How much?— 100.000.— That is too much.— And a code that displays on screen the...
Innovation and Laboratory Area in ElevenPaths 46% Of the Main Spanish Websites Use Google Analytics Cookies Before the Consent Required by The Spanish Data Protection Agency (AEPD) Over the past few months, many IT departments have been busy carrying out this task of adaptation in order to comply with the new regulations on cookies. Every time...
Franco Piergallini Guida How to Trick Apps That Use Deep Learning for Melanoma Detection One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
ElevenPaths Cyber Security Weekly Briefing February 13-19 Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve years. The flaw,...
ElevenPaths Cybersecurity Weekly Briefing August 1-7 Database of +900 Pulse Secure VPN Enterprise Servers An underground forum post has been detected showing the existence of a database containing data collected on more than 900 Pulse Secure...
ElevenPaths 4 Tips to Secure Your Data We surf the Internet on a daily basis. Many of us are already considered digital natives. Yes, it is almost an extension of us, but are we really aware...
Has the Office as We Know It Come to an End?Miguel Ángel Martos 30 September, 2020 2020 has had a difficult start. We have learned that what was “usual” may not be the best. We should reconsider this idea of “the office” as the centre of the company. This crisis may be the key to showing that a physical office building is a thing of the past, especially when remote working can be the guarantee for business continuity. In times of crisis, technology allows us to work from anywhere and on any device. We are witnessing a change of focus towards a model of distance working driven by need and by companies seeking to take advantage of its potential benefits. But while workers think that remote working is an obvious thing nowadays, we still need a cultural change in the way companies think about remote working. Remote working forces companies and employees to change. There are two areas where change stands out because of its impact on people: personal and collective interaction and security. Some fear that remote working may kill the corporate culture. It is not uncommon for someone to tell us that “being in the office is key to collaboration and boosting corporate culture” or “I love coming to the office to see my colleagues”. In many companies it is quite normal to go out in groups for breakfast. It allows us to enjoy the social aspect of work and the culture of chatting with our colleagues. But, does that help us to be more efficient? People think that work is more effective if we do it together, and that is completely true. However, corporate culture is developed through strong principles adopted by management and employees. The interaction and execution of these principles take place remotely and, in the office. Especially when excellent collaboration tools are used, such as O365, Slack, Zoom, etc. Physical security: when you enter the office, the company provides a “safe” environment: it controls access to the building, the climate, spaces, etc. Working from home allows oneself to control the environment and keeps the motivation and efficiency when working. It also protects oneself in a crisis where it is not advisable to be close to each other in the same room.Technical security: the company also provides tools and services necessary to carry out our work. It ensures (hopefully) access to its information and services, such as e-mail, file sharing, applications, Internet, etc. The methods focus on offering the highest possible degree of security, controlling access, connections and providing visibility of what is happening when interacting with corporate applications. It is becoming essential for companies to be able to protect their services, applications and the data residing within them from nowadays threats, which on their side, have also taken advantage of the circumstances and increased in number. However, in a constantly developing world, the tools and resources available to implement security from within and outside the workplace are also improving and adapting to the new conditions of decentralised and distributed environments. Where We Are Headed: Remote Work, Zero Trust and SASE Companies must apply two key models to protect remote work: Secure Access Service Edge (SASE) and Zero Trust. Both models are based on direct connectivity. They offer fast and secure routes to access any application. In the previous model (over 30 years old now), a secure perimeter protected the data centre, applications and data from external threats. With cloud applications, the Internet of Things (IoT) becoming more common and users connecting from many locations, this previous model is no longer sustainable and not as secure. How could a perimeter around data be applied outside the corporate network? Secure Access Service Edge (SASE) specifically addresses the security reality faced by organisations choosing the cloud. SASE secures the traffic between the user and the application. It is the journey and not the goal that is most important. With the SASE model, digital enterprises can provide security at all times, wherever the user’s location is, without complex and costly hardware stacks of security devices that require constant maintenance and updating.Zero Trust provides a unique and simple access model for users, regardless of where they are and what they are trying to access. This is critical, as companies quickly transfer employees to remote work environments. Using the principle of zero trust allows companies to isolate and segment who has access to what. There are no more shared spaces, each access must be validated before it is enabled. Connections are ephemeral: the user and the application connect only for a specific communication and nothing else. Telefónica’s ElevenPaths enhances its global IoT security capabilities with SubexDIARIO Already Detects “Stomped” Macros, But What Are They Exactly?
Franco Piergallini Guida How to Trick Apps That Use Deep Learning for Melanoma Detection One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
ElevenPaths Cyber Security Weekly Briefing February 13-19 Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve years. The flaw,...
Gonzalo Álvarez Marañón Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data — Here are the exact coordinates of each operative deployed in the combat zone.— How much?— 100.000.— That is too much.— And a code that displays on screen the...
ElevenPaths WhatsApp, Telegram or Signal, Which One? In the world of smartphones, 2021 began with a piece of news that has left no one indifferent: the update of WhatsApp’s terms and conditions of use. This measure,...
Sergio De Los Santos 26 Reasons Why Chrome Does Not Trust the Spanish CA Camerfirma From the imminent version 90, Chrome will show a certificate error when a user tries to access any website with a certificate signed by Camerfirma. Perhaps it is not...
ElevenPaths Cyber Security Weekly Briefing February 6-12 Attempted contamination of drinking water through a cyber-attack An unidentified threat actor reportedly accessed computer systems at the City of Oldsmar’s water treatment plant in Florida, US, and altered the...