News & Events

CyberSecurity Shot


Investigation reports on network information leakage.

Discover with our analyst team all details about the latest data leaks cases and some recommendations that could have prevented it. Each comes with a real case. Are you going to miss it?

When preparing CyberSecurity Shots, the analysts use monitoring tools that get information from open source and other web sites, they also apply analysis methodologies to anticipate potential threats. Therefore, the work they carry out involves interpretation of leaked information in order to provide with the most exact approximation on implications of the recent security and high-impact breaches, as well as their consequences for individuals and companies from different sectors.

To define the leak’s impact level, they take into account the affected technology assets and analyze the sensitivity of the disclosed information. It's the nature of compromised services, put in the special context of each information leakage, which serves to define the scope and its potential fraudulent uses. Claims evaluation made about the incident and its identified documentary information is used to complete the information available about its authorship and the underlying motivation of suspected culprits.

Oct 2016

Research report “ data leakage”

The latest data breach case affected ElevenPaths’ intelligence analysts reveal the details of in this research report. Download the new report and find out more!

Read more

Research report “ data breach”

Our intelligence analysts unravel the new data breach case of the music streaming platform Download the full research and find out more!

Read more

Sep 2016

Dropbox data leakage

Our intelligence analysts reveal the details of the new data breach case of Dropbox, put up for sale on the deep web by the cyber-identity peace_of_mind. Get informed about the case in our new research report!

Read more