Telefónica Tech Cyber Security Weekly Briefing, 1 — 7 October Lazarus targets Dell via new FudModule rootkit ESET researchers have reported a new Lazarus campaign targeting a Dell hardware driver using a new rootkit called FudModule. The rootkit uses a...
Olivia Brookhouse How to build a Smart City: with IoT and Big Data A smart city is defined as a high-performance urban environment, where the aim is to optimize the use of resources and access to services. Smart cities take advantage of technological...
Roberto García Esteban Cloud Computing is the future of the healthcare sector Healthcare is a sector that is continuously generating a large amount of data. To put it in numbers, every year our National Health System manages 234 million medical consultations...
Nacho Palou How digitalisation makes it possible to accurately identify and meet the needs of an organic cherry farm Before tackling the digitalisation of their organic cherry orchard, the Vicente brothers, the caretakers of the Frutas Mifra cherry farm, had to ride around the entire farm on a...
Telefónica Tech Cyber Security Weekly Briefing, 24 — 30 September Two 0-day vulnerabilities exploited in Microsoft Exchange The Vietnamese cybersecurity team GTSC reported two 0-day vulnerabilities in Microsoft Exchange three weeks ago through the Zero Day Initiative (ZDI) that are...
Javier Coronado Blazquez AI of Things (X) 10-minute delivery: how Artificial Intelligence optimises delivery routes Nowadays, speed and immediacy is a necessity for almost any company, especially for those in the logistics sector dedicated to the transport and delivery of goods. Due to the...
Marta Mallavibarrena Human factor key in cyber security Dozens of vulnerabilities are discovered every day in the current landscape (an average of 50 in 2021), and attackers are finding new and ingenious ways to exploit them. It...
Telefónica Tech Big Data and Artificial Intelligence solutions for the tourism industry Big Data technologies and Artificial Intelligence techniques offer an infinite world of opportunities in all sectors of the economy, and especially in tourism. We are talking about having the...
ElevenPaths Cyber Security Weekly Briefing, 17 — 23 September Quantum and BlackCat ransomware use Emotet as entry vector Researchers at AdvIntel have published the results of an investigation reporting that ransomware operators Quantum and BlackCat have adopted the use...
Andrés Escribano The Ultimate Evolution Towards the Digitisation of Industry Digital transformation brings us new opportunities, it is changing our lives both in the way we communicate and in the way we produce. Digitalisation of the industrial fabric in particular...
ElevenPaths Squeezing the numbers and facts of Google’s annual Android security report Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick Quick and dirty script in Powershell to check certificate fingerprints Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths) Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick FOCA Final Version, the ultimate FOCA You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...