ElevenPaths Cyber Security Weekly Briefing 27 February – 5 March HAFNIUM attacks Microsoft Exchange servers with 0-day exploits Microsoft has detected the use of multiple 0-day exploits to carry out targeted attacks against on-premise versions of Microsoft Exchange Server (2013,...
Franco Piergallini Guida How to Trick Apps That Use Deep Learning for Melanoma Detection One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
ElevenPaths Cyber Security Weekly Briefing January 9-15 Sunburst shows code matches with Russian-associated malware Kaspersky researchers have found that the Sunburst malware used during the SolarWinds supply chain attack is consistent in its characteristics with Kazuar, a...
Innovation and Laboratory Area in ElevenPaths ChainLock, A Linux Tool for Locking Down Important Files Let’s say you have a valuable file on your computer, such as a bitcoin wallet file (“wallet.dat”), or some other file with sensitive information, and you decide put a...
Juan Elosua Tomé New FARO Version: Create Your Own Plugin and Contribute to Its Evolution We are pleased to announce the latest version of FARO, our open-source tool for detecting sensitive information, which we will briefly introduce in the following post. Nowadays, any organisation can...
Innovation and Laboratory Area in ElevenPaths Telefónica Tech’s Cybersecurity Unit Becomes Part of The European Commission’s Cybersecurity Atlas Telefónica Tech’s Innovation and Laboratory Area in cyber security has been included as part of the European Commission’s Cybersecurity Atlas, a knowledge management platform that maps, classifies, visualises and...
ElevenPaths Technically analysing a SIEM… are your logs secure? The SIEMs are usually utilized within highly secure of regulated environments, where regular log monitoring and analysis is required to search for security incidents. They help to make...
Sergio De Los Santos The Attack on SolarWinds Reveals Two Nightmares: What Has Been Done Right and What Has Been Done Wrong All cyber security professionals now know at least part of what was originally thought to be “just” an attack on SolarWinds, which has just truned out to be one...
ElevenPaths Cyber Security Weekly Briefing 27 February – 5 March HAFNIUM attacks Microsoft Exchange servers with 0-day exploits Microsoft has detected the use of multiple 0-day exploits to carry out targeted attacks against on-premise versions of Microsoft Exchange Server (2013,...
Innovation and Laboratory Area in ElevenPaths Telefónica Tech’s Cybersecurity Unit Becomes Part of The European Commission’s Cybersecurity Atlas Telefónica Tech’s Innovation and Laboratory Area in cyber security has been included as part of the European Commission’s Cybersecurity Atlas, a knowledge management platform that maps, classifies, visualises and...
ElevenPaths Cybersecurity Weekly Briefing October 3-9 New botnet detected that deletes data from the infected device A group of researchers from the company Netlab 360 published yesterday their latest findings on a new botnet that specialises...
ElevenPaths Cyber Security Weekly Briefing January 9-15 Sunburst shows code matches with Russian-associated malware Kaspersky researchers have found that the Sunburst malware used during the SolarWinds supply chain attack is consistent in its characteristics with Kazuar, a...
Latch Plugins Contest 2016: Videos and DocumentationFlorence Broderick 21 February, 2017 You can find here the compilation of plugins submitted to the Latch Plugins Contest 2016. Congratulations to all participants for the work done and the results! Plugin Name: Latch OpenWRT. Author: Juan Camero. Description: Plugin for the OpenWRT open firmware for neutral routers that allows to manage the internet connection of wireless devices in an intuitive way through a smartphone with Latch. Github Linkb: https://github.com/JCameroMartin/LatchOpenWRT Documentation Link: https://github.com/JCameroMartin/LatchOpenWRT Video Link: Plugin Name: Umbraco Latch Author: Cristhian Amaya Description: Plugin or package in Umbraco’s jargon (CMS open source) that allows to protect several operations of the administration area or backoffice. Github Link: https://github.com/camaya/umbraco-latch Documentation Link: https://github.com/camaya/umbraco-latch Video Link: Plugin Name: Latchdroid Author: Pepe Nieto Description: Lock of Android devices with Latch acting as a curfew, so that minors stop using these devices. Github Link: https://www.github.com/ppnieto/latchdroid Documentation Link: https://github.com/ppnieto/latchdroid/blob/master/Latchdroid-UserManual.pdf Video Link: Plugin Name: Heaven´s Door RA. Author: Matías Troncoso. Description: Plugin that allows the activation/deactivation of remote access to a device through the Internet. Performing a Port Forwarding on the router that allows access to the Internet. Github Link: https://github.com/matiast-gh/heavens-door-ra Documentation Link: https://github.com/matiast-gh/heavens-door-ra/tree/master/docs Video Link: Plugin Name: Latch MyCar. Author: Diego Gamboa. Description: It adds a security layer to vehicles that are powered by mobile devices or wireless keys. Github Link: https://github.com/skyg4mb/LatchMyCar Documentation Link: https://micloud.movistar.es/share/8de115813d5a02b302b2017055a66b33b1239716b47432b0#1 Video Link: Plugin Name: Mosquito MQTT Author: Álvaro Caso Description: A Mosquitto plugin that allows us to easily add a second factor authorization to the IoT ecosystem, performing the integration in the platform (MQTT Broker), releasing resources and maximizing compatibility and scalability. Github Link: https://github.com/oribit/latch-plugin Documentation Link: https://github.com/oribit/latch-plugin/tree/master/manual Video Linko: We would like to take this opportunity to remind you the winners of the contest: First prize: 5.000 USD. Winner: Alvaro Caso. Plugin: Mosquito MQTT. Second prize: 2.000 USD. Winner: Juan Camero. Plugin: Latch OpenWRT. Thank you all for participating! ElevenPaths and Enigmasec associated to help small and medium organizations in face of the invasion of systems4 reasons why you should visit the LUCA stand at MWC2017
ElevenPaths Cyber Security Weekly Briefing 27 February – 5 March HAFNIUM attacks Microsoft Exchange servers with 0-day exploits Microsoft has detected the use of multiple 0-day exploits to carry out targeted attacks against on-premise versions of Microsoft Exchange Server (2013,...
Juan Elosua Tomé New FARO Version: Create Your Own Plugin and Contribute to Its Evolution We are pleased to announce the latest version of FARO, our open-source tool for detecting sensitive information, which we will briefly introduce in the following post. Nowadays, any organisation can...
Innovation and Laboratory Area in ElevenPaths Telefónica Tech’s Cybersecurity Unit Becomes Part of The European Commission’s Cybersecurity Atlas Telefónica Tech’s Innovation and Laboratory Area in cyber security has been included as part of the European Commission’s Cybersecurity Atlas, a knowledge management platform that maps, classifies, visualises and...
Franco Piergallini Guida How to Trick Apps That Use Deep Learning for Melanoma Detection One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
ElevenPaths Cyber Security Weekly Briefing February 13-19 Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve years. The flaw,...
Gonzalo Álvarez Marañón Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data — Here are the exact coordinates of each operative deployed in the combat zone.— How much?— 100.000.— That is too much.— And a code that displays on screen the...