Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Bluetooth for IoT, much more than handsfree technology A world-champion IoT
  • Big Data
    • The Future of the Construction Industry is Upon Us A digital twin to save the Mar Menor
  • Cybersecurity
    • Where does ransomware attack? Three main pillars Human Factors in Cybersecurity: Protect Yourself
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

ransomware

Íñigo Echavarri

The role of “Threat Hunting” as an enabler in ransomware incident response

Following in the wake of the articles developed to shed light on incident response in our group, it seems clear that the actions required to deploy ransomware with the...
ransomware
Martiniano Mallavibarrena

Understanding The Dynamics of Ransomware Security Incidents

The ransomware phenomenon If there is one term that has earned its way to the top of the headlines in the media over the last two years, ransomware is undoubtedly...
Cyber Intelligence Unit
Félix Brezo Fernández

The Work of a Cyber Intelligence Unit in The Context Of Incident Response

Besides the work carried out by our colleagues in the forensic analysis, malware analysis or Threat Hunting teams, which we have reviewed in the articles in this series associated...
DFIR
Víctor José González Arcos

DFIR services in a ransomware incident response

As we saw in the first post of the series, the IR (incident response) process in case of attacks using ransomware is fundamental, relying on the work of several...
ElevenPaths

Wannacry chronicles: Messi, korean, bitcoins and ransomware last hours

It is hard to say something new about Wannacry, (the ransomware itself, not the attack). But it is worth investigating how the attacker worked during last hours before the...
ElevenPaths

Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?

When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick

ElevenPaths is now a NoMoreRansom.org associated partner

Ransomware has a severe impact for IT companies and users. The increasing popularity of this security threat along with the profitable business for criminals make ransomware one of the...
Florence Broderick

ElevenPaths discovers the Popcorn ransomware passwords: no need to infect other people to decrypt for free

MalwareHunterTeam has discovered a new variant of ransomware that is quite curious. At ElevenPaths we have been able to download and analyze the new improved versions that make several...
Florence Broderick

Trend Ransomware Report

21st Century ExtortionThe scourge of crypto-ransomware malware featured prominently in threat predictions for 2015, and the 165% increase reported in Q1 2015 indicate that these fears were well founded....

Navegación de entradas

Volver a portada
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Showing certificate chain without validating with Windows "certificate store" (C#)
Java has its own independent certificate store. If you wish to view natively in Windows a certificate extracted from an APK or JAR file Windows may not find the...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration