ElevenPaths A Trillion-Dollar on Offer to the Puzzle Solver Are you a fan of mathematical puzzles? Well, here’s a lucrative one… but hard to beat! If you discover a method to crack the hashes used in Blockchain, you...
ElevenPaths Cyber Security Weekly Briefing April 3-9 Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files under...
ElevenPaths Cybersecurity Weekly Briefing August 15-21 EmoCrash: stopping Emotet for almost 6 months Emotet’s comeback after a 6 month-period absence has hinted that the hiatus in the malware’s operations could be due to the discovery of...
Gonzalo Álvarez Marañón Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later Have you ever played rock, paper, scissors? I bet you have. Well, let’s put the tin lid on it: how would you play through the phone? One thing is...
ElevenPaths Cyber Security Weekly Briefing April 3-9 Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files under...
ElevenPaths No Pain, No Gain: Let´s Hack 2021 “No pain, no gain”, you have probably heard this on more than one occasion. An expression that is used endlessly in different environments, in a time when the body...
Sergio De Los Santos A government is known by the Apple data it requests Sometimes, governments need to be underpinned by huge corporations to carry out their work. When a threat depends on knowing the identity or gaining access to a potential attacker...
Innovation and Laboratory Area in ElevenPaths #CyberSecurityReport19H1: 45,000 apps removed from Google Play, 2% of them detected by antiviruses Currently, there are a number of reports addressing trends and summaries on security. However, at ElevenPaths we want to make a difference. Our Innovation and Labs team has just...
ElevenPaths A Trillion-Dollar on Offer to the Puzzle Solver Are you a fan of mathematical puzzles? Well, here’s a lucrative one… but hard to beat! If you discover a method to crack the hashes used in Blockchain, you...
ElevenPaths Cyber Security Weekly Briefing April 3-9 Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files under...
Sergio De Los Santos How Traditional CA’s Are Losing Control of Certificates and Possible Reasons Why Chrome Will Have a New Root Store It’s all about trust. This phrase is valid in any field. Money, for example, is nothing more than a transfer of trust, because obviously we trust that for a...
Gabriel Álvarez Corrada 5G Connectivity and its Impact on Industry 4.0: Maturity and Evolution One of the factors that indicates the maturity of some branches of technology is the incorporation of improvements as this technology evolves, which are different from those considered at...
Telefónica’s ElevenPaths enhances its global IoT security capabilities with SubexElevenPaths 30 September, 2020 This collaboration provisions the offering of IoT Threat Detection, an incident monitoring and response service for IoT environments.This solution has the capability of learning and modelling the legitimate behaviour of IoT devices through traffic analysis and the implementation of Machine Learning techniques to detect anomalies and potential cybersecurity incidents. ElevenPaths, Telefónica’s Cybersecurity Company, takes a further step in protecting IoT and converged environments with the signature of a global partnership agreement with Subex aimed at offering the IoT Threats Detection service worldwide. This monitoring and incident response service will leverage Machine Learning and specific IoT/OT threat intelligence techniques to profile the behaviour of IoT devices and associated networks, thereby making it possible to detect and respond to anomalies or cyberattacks that may affect the different end-to-end elements in IoT (devices, communication network, or service platforms). The service is fed by a global network of honeypots (“decoy” system designed to be the target of an attack to detect it and obtaining more information) specialised in IoT/OT. This network is distributed throughout the world in over 60 locations and covers more than 500 different system architectures, processing on average 10 million sophisticated cyberattacks every day. Telefónica’s extensive experience in network management enables the access to traffic information that will be analysed later using Subex’s capabilities. Moreover, customers can receive all benefits of a managed service through the Telefónica operations expertise, relaying on the ElevenPaths’ SOC (Security Operations Centre), that has locations in eleven centres on the planet and is supported by experts specially trained in this technology. IoT Threat Detection addresses several pressing IoT challenges: Increased discoverability and visibility of the IoT devices that are part of the infrastructure as well as the organisations’ services, to gain an understanding of their legitimate behaviour.Holistic protection of organizations, where IoT devices must be seen as an increasingly significant part of the whole infrastructure to be protected. Most of the time, these elements may be the weakest link due to their dispersion, their physical accessibility, and the inexistence or deficiency of security controls.The need to have solutions capable of escalating to the dimensions required by IoT infrastructures, as well as having sources and mechanisms to generate specific cyberintelligence in this field that guarantees the effectiveness and reliability of the detection systems. Among the many benefits of this service, being an agentless solution, releases from the need to install software on the IoT devices. Given the IoT intrinsic dimension and the limited resources associated with many of these devices, this factor constitutes a great advantage. Also, as the analysis is performed over a copy of the traffic, the solution does not impact the original traffic of the IoT service or its SLAs at any time. The vast majority of our customers from almost any sector we focus on have launched − or will launch in the short term − projects and initiatives where IoT technologies are the key. While the possibilities in terms of new services and efficiency improvements are huge, they also mean greater exposure to security risks that need to be properly managed. This agreement with Subex allows us to provide a best-in-class monitoring and incident response service for IoT environments.Alberto Sempere, Product and Go-To-Market Director at ElevenPaths Our partnership with ElevenPaths is built around affording businesses a new class of enterprise security that spans environments, devices, cybersecurity strategies, and regional and global threats to deliver true cyber-resilience that is deep, robust and sustainable. We are excited by the possibilities that this alliance brings forth specifically in areas such as jointly equipping businesses to deal with the existing and emerging cyber threats with a high level of confidence and assurance.Kiran Zachariah, VP Digital Security at Subex Press release Click to access telefonica-elevenpaths-enhances-iot-security-capabilities-subex.pdf New TheTHE Version with URLScan and MalwareBazaar PluginsHas the Office as We Know It Come to an End?
ElevenPaths A Trillion-Dollar on Offer to the Puzzle Solver Are you a fan of mathematical puzzles? Well, here’s a lucrative one… but hard to beat! If you discover a method to crack the hashes used in Blockchain, you...
ElevenPaths Cyber Security Weekly Briefing April 3-9 Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files under...
ElevenPaths No Pain, No Gain: Let´s Hack 2021 “No pain, no gain”, you have probably heard this on more than one occasion. An expression that is used endlessly in different environments, in a time when the body...
ElevenPaths What is VPN and What is It For? VPN connections are nothing new, they have been with us for a long time, always linked to the business world. The great versatility and its different uses have made...
ElevenPaths Cyber Security Weekly Briefing March 20-26 Analysis of the new cyber-espionage group SilverFish The PRODAFT Threat Intelligence team (PTI) has discovered a highly sophisticated cybercriminal group called SilverFish, which operates exclusively against large enterprises and public...
ElevenPaths Cyber Security Mechanisms for Everyday Life It is becoming more and more common to find in the general media news related to cyber-attacks, data breaches, privacy scandals and, in short, all kinds of security incidents....