ElevenPaths Cyber Security Weekly Briefing January 9-15 Sunburst shows code matches with Russian-associated malware Kaspersky researchers have found that the Sunburst malware used during the SolarWinds supply chain attack is consistent in its characteristics with Kazuar, a...
Sergio De Los Santos The Attack on SolarWinds Reveals Two Nightmares: What Has Been Done Right and What Has Been Done Wrong All cyber security professionals now know at least part of what was originally thought to be “just” an attack on SolarWinds, which has just truned out to be one...
ElevenPaths Cybersecurity Weekly Briefing August 15-21 EmoCrash: stopping Emotet for almost 6 months Emotet’s comeback after a 6 month-period absence has hinted that the hiatus in the malware’s operations could be due to the discovery of...
ElevenPaths Telefónica Business Solutions Reinforces the Security of its Network with Clean Pipes 2.0 MADRID, 14 September, 2017 – ElevenPaths, Telefónica’s cyber security unit, today announced the launch of Clean Pipes 2.0, a software-based security service, to prevent known and unknown threats across...
Gonzalo Álvarez Marañón Plausibly Deniable Encryption or How to Reveal A Key Without Revealing It When the secret police arrested Andrea at the airport checkpoint, she thought it was a mere formality reserved for all foreign citizens. When they searched her luggage and found...
ElevenPaths Cyber Security Weekly Briefing January 9-15 Sunburst shows code matches with Russian-associated malware Kaspersky researchers have found that the Sunburst malware used during the SolarWinds supply chain attack is consistent in its characteristics with Kazuar, a...
Innovation and Laboratory Area in ElevenPaths TheTHE: The Threat Hunting Environment, our tool for researchers TheTHE, a unique tool within its category that allows analysts and hunters to carry out their research tasks in a more agile and practical way.
Diego Samuel Espitia Using Development Libraries to Deploy Malware Cybercriminals seek strategies to achieve their objectives: in some cases, it is users’ information; in others, connections; sometimes they generate networks of computers under their control (botnets), etc. Any...
Gonzalo Álvarez Marañón Plausibly Deniable Encryption or How to Reveal A Key Without Revealing It When the secret police arrested Andrea at the airport checkpoint, she thought it was a mere formality reserved for all foreign citizens. When they searched her luggage and found...
ElevenPaths Cyber Security Weekly Briefing January 9-15 Sunburst shows code matches with Russian-associated malware Kaspersky researchers have found that the Sunburst malware used during the SolarWinds supply chain attack is consistent in its characteristics with Kazuar, a...
Alberto Cuesta Partida We Acquire iHackLabs to Boost the Training of Our Ethical Hackers Telefónica Tech, through ElevenPaths, incorporates the platforms and knowledge about cyber security training of the iHackLabs startup.
ElevenPaths Cybersecurity Weekly Briefing October 24-30 Critical vulnerability in Hewlett Packard Enterprise SSMC Hewlett Packard Enterprise has fixed a critical authentication evasion vulnerability (CVE-2020-7197, CVSS 10) affecting its StoreServ Management Console (SSMC) storage management software. HPE...
Looking for a MDR partner? Beware, not all MDRs are the sameNikolaos Tsouroulas 30 June, 2020 Are you throwing more money than you can afford into your SOC but still failing to detect and respond quickly enough to incidents? Have you suffered the impact of an incident and need to quickly ramp up your security operations before the next one arrives? Are you confused with the hundreds of products and acronyms that the market is pitching to you everyday and just want a MDR partner you can trust to help you create the right solution for you? This is what we do at ElevenPaths, Telefonica’s Cybersecurity company. We believe that all organizations should be able to count on modern security operations with focus on: Post-breach detection on the endpoint and network based on full visibility and behavior-based techniquesThreat intelligence to better detect new threats and guide preparation and responseAdvanced analytics on all sources available to the organization to add an additional advanced detection layer that unifies all threat vectorsProactive hunting campaigns to make sure nothing slips through the cracksAn incident response and crisis management program with all the required capabilities available for when the rainy day comesScalability and automation to reduce costs Everything you should know about the Managed Detection and Response market We believe that no size fits all and that not all MDR offerings are made equal. To further help our customers understand what they should be looking for in and MDR program and partner we have worked together with Harden Stance and leading MSSP and MDR providers in a report that reviews the MDR market and highlights all the important aspects that a customer looking to improve her detection and response capabilities should consider before engaging with a provider. You can find the full report about “What to Expext from MDR & MDR Providers” courtesy of ElevenPaths here, and contact us with any question or comment here. What does ElevenPaths have to offer as a MDR partner? Our main components are: MDR Lab (detection and response)Our expert team of threats evaluate technologies from leading manufacturers (e.g. EDR, NTA, TIP, Intelligence Feed, Advanced Analytics Platforms etc.), in order to provide consulting services based on organizations’ needs and technical requirements.Managed services in technologies and platformsElevenPaths provide tailored or turn-key managed services for those technologies and platforms. Administration and investigation of EDR alerts or integration of IoCs and management of TIPs for the application of threat intelligence.Intelligent SOC (iMSSP)Traditional MSSP capabilities merge with the sophisticated features of MDR to enable the customer to outsource their advanced capabilities of monitoring, detection, hunting and response in an ElevenPaths i-SOC. China Leads the Race Towards an Attack-Proof Quantum InternetCOVID-19, Insight from the Telco Security Alliance
Gonzalo Álvarez Marañón Plausibly Deniable Encryption or How to Reveal A Key Without Revealing It When the secret police arrested Andrea at the airport checkpoint, she thought it was a mere formality reserved for all foreign citizens. When they searched her luggage and found...
ElevenPaths Cyber Security Weekly Briefing January 9-15 Sunburst shows code matches with Russian-associated malware Kaspersky researchers have found that the Sunburst malware used during the SolarWinds supply chain attack is consistent in its characteristics with Kazuar, a...
Sergio De Los Santos The Attack on SolarWinds Reveals Two Nightmares: What Has Been Done Right and What Has Been Done Wrong All cyber security professionals now know at least part of what was originally thought to be “just” an attack on SolarWinds, which has just truned out to be one...
Antonio Gil Moyano Homeworking: Balancing Corporate Control and Employee Privacy (I) At this point in time and looking back on 2020, nobody would have imagined the advance in the digitalisation of organisations and companies due to the irruption of homeworking...
Innovation and Laboratory Area in ElevenPaths 46% Of the Main Spanish Websites Use Google Analytics Cookies Before the Consent Required by The Spanish Data Protection Agency (AEPD) Over the past few months, many IT departments have been busy carrying out this task of adaptation in order to comply with the new regulations on cookies. Every time...
Carlos Ávila WhatsApp Terms and Conditions Update: A Cheeky Move? Surely by now many have already accepted the new terms and privacy policies without really knowing what they were about or their impact on the privacy of their data,...