ElevenPaths We Announce Our Digital Operation Centers, Where All Our Digital Services Are Focused The Telefónica Cybersecurity Unit holds its VII Security Innovation Day, under the motto ‘Guards for Digital Lives.’With speakers such as Chema Alonso, Pedro Pablo Pérez, Julia Perea and Ester...
Innovation and Laboratory Area in ElevenPaths Google report 17% of Microsoft vulnerabilities. Microsoft and Qihoo, 10% Who finds more vulnerabilities in Microsoft products? What percentage of vulnerabilities are discovered by Microsoft, other companies or vulnerability brokers? How many flaws have unknown discoverers? Over this report we have analyzed...
ElevenPaths Telefónica and ElevenPaths integrate its digital signature solution and biometric SealSign with Microsoft Azure The company presents its latest developments at the 5th Security Innovation Day TELEFÓNICA INTEGRATES ITS DIGITAL SIGNATURE SOLUTION AND BIOMETRIC SEALSIGN WITH MICROSOFT AZURE This integration of the SealSign platform with...
ElevenPaths How are we preparing ourselves for the RSA Conference 2018? 2018 is a unique year for us. We continue on our journey with the great security community to jointly combat the threats faced by our sector. At ElevenPaths, Telefónica’s...
ElevenPaths We Announce Our Digital Operation Centers, Where All Our Digital Services Are Focused The Telefónica Cybersecurity Unit holds its VII Security Innovation Day, under the motto ‘Guards for Digital Lives.’With speakers such as Chema Alonso, Pedro Pablo Pérez, Julia Perea and Ester...
Innovation and Laboratory Area in ElevenPaths EasyDoH Update Hot off the Press: New Improvements and Functionalities Just a few weeks ago, we launched EasyDoH: an extension for Firefox that simplifies the use of DNS over HTTPS. We have been asked about its improvements and several...
ElevenPaths New research: Docless Vietnam APT. A very interesting malware against Vietnam Government We have detected a malware sent to some email accounts belonging to a Vietnam government domain. This email is written in Vietnamese and is dated March 13th, 2019. It seems to...
ElevenPaths New tool: PySCTChecker This is a “Quick and dirty” Python script for checking if a domain properly implements Certificate Transparency. If so, it is possible to observe how Certificate Transparency is implemented...
ElevenPaths We Announce Our Digital Operation Centers, Where All Our Digital Services Are Focused The Telefónica Cybersecurity Unit holds its VII Security Innovation Day, under the motto ‘Guards for Digital Lives.’With speakers such as Chema Alonso, Pedro Pablo Pérez, Julia Perea and Ester...
Innovation and Laboratory Area in ElevenPaths Google report 17% of Microsoft vulnerabilities. Microsoft and Qihoo, 10% Who finds more vulnerabilities in Microsoft products? What percentage of vulnerabilities are discovered by Microsoft, other companies or vulnerability brokers? How many flaws have unknown discoverers? Over this report we have analyzed...
ElevenPaths The hugest collection of usernames and passwords has been filtered…or not (I) Sometimes, someone frees by mistake (or not) an enormous set of text files with millions of passwords inside. An almost endless list of e-mail accounts with their passwords or...
Innovation and Laboratory Area in ElevenPaths Google report 17% of Microsoft vulnerabilities. Microsoft and Qihoo, 10% Who finds more vulnerabilities in Microsoft products? What percentage of vulnerabilities are discovered by Microsoft, other companies or vulnerability brokers? How many flaws have unknown discoverers? Over this report we have analyzed...
Mobile Threat ProtectionFlorence Broderick 28 April, 2016 The agreement between Eleven Paths and Check Point on commercialization and technological integration allows Telefonica to complement its Enterprise Mobility Management (EMM) solution with the most advanced mobile protection service. At ElevenPaths we strongly believe that the only viable Information Security is one that protects all breaches of the corporate perimeter. When criminal organizations attack a corporation, they try to make their way successively to all entry-points in order to break any possible barrier. Hence, the security of the whole system is equal to the security of its weakest front. The security strategies that don´t shield against all possible attack vectors are completely useless versus advanced attacks. This is the principle that guided us when developing our mobile security service product during the last months. We have implemented two confluent lines of work: on one hand, the capabilities improvement of our product Tacyt; on the other hand a thorough market research looking for the most forward-looking security technology which would meet all and each one of our demanding requirements (depicted in the diagram below) and which would naturally adjust itself to our products and services ecosystem. We are convinced that the Mobile Threat Protection Service of Telefonica integrated into our Enterprise Mobility Management (EMM) suite is the best and the most comprehensive protection in the world. This service is disruptive for the following reasons: It protects against the three mobile vectors attack. Most of the mobile security solutions are incomplete since they are only able to detect malicious applications, being ineffective against device or network attacks. Behavioural Adaptive Security Analysis. In mobile context, the speed of attacks is almost instantaneous and malware mutation is fast. This has made it undetectable for traditional signature-based antivirus. Therefore MTP includes patented algorithms of behavioural analysis that, in combination with the advanced correlation from Tacyt, allows to detect zero-day attacks Automatic triggering of quarantine policies. The answer to an attack can´t wait. For that reason MTP is integrated with the Telefonica MDM service to immediately trigger quarantine actions in order to isolate all at-risk devices and prevent information theft and lateral movements. A built-in user-friendly service which ensures enterprise productivity. MTP is one more component of the Enterprise Mobility Management (EMM) suite of Telefonica. Thanks to the suite, the Telefonica clients have a single access point for corporate mobility services: connectivity, telecom expenses management, mobilization and productivity processes, mobile device management, and, of course, advanced security. It is also possible to hire some efficient professional services to which delegate the aforementioned services management. To conclude, we strongly believe that our clients benefit from the best mobile security service available on the market. *It may be of your interest: ElevenPaths y Check Point Software Technologies ofrecemos servicios conjuntos de seguridad móvil ElevenPaths and Check Point Software Technologies provide joint Mobile Protection Services Globally Francisco Oteiza Lacalle francisco.oteizalacalle@telefonica.com @Fran_Oteiza Francisco Oteiza LinkedIn Social engineering is more active than ever[New report] “Cyber-insurance: cyber risk transfer in Spain”
Sergio De Los Santos New App to Clean Metadata More Easily We are not going to repeat the dangers of metadata, since it has been discussed for quite some time now. However, we can try to make its management and cleaning simpler. Some...
ElevenPaths We Announce Our Digital Operation Centers, Where All Our Digital Services Are Focused The Telefónica Cybersecurity Unit holds its VII Security Innovation Day, under the motto ‘Guards for Digital Lives.’With speakers such as Chema Alonso, Pedro Pablo Pérez, Julia Perea and Ester...
Innovation and Laboratory Area in ElevenPaths EasyDoH Update Hot off the Press: New Improvements and Functionalities Just a few weeks ago, we launched EasyDoH: an extension for Firefox that simplifies the use of DNS over HTTPS. We have been asked about its improvements and several...
Innovation and Laboratory Area in ElevenPaths Google report 17% of Microsoft vulnerabilities. Microsoft and Qihoo, 10% Who finds more vulnerabilities in Microsoft products? What percentage of vulnerabilities are discovered by Microsoft, other companies or vulnerability brokers? How many flaws have unknown discoverers? Over this report we have analyzed...
Innovation and Laboratory Area in ElevenPaths EasyDoH: our new extension for Firefox that makes DNS over HTTPS simpler A year ago, the IETF has raised to RFC the DNS over HTTPS proposal. This new is more important than it may seem. For two reasons: firstly, it’s a...
Sergio De Los Santos Facebook signed one of its apps with a private key shared with other Google Play apps since 2015 Facebook Basics is a Facebook app aimed at countries with poor connectivity, where a free access service to WhatsApp and Facebook is provided. It has been discovered that the Android version...