Latest News

May 2018

Google’s project to fight election attacks

The attacks were triggered during the elections. In this way, Jigsaw, a technological incubator which is Google’s parent company, has released Project Shield, a free tool for DDoS protection.

Read more

Telefónica hacks cybercriminals

It uses a defense system based on counterintelligence that makes cyber attackers think that they have managed to breach the network. The objective is to collect data to learn from cybercrime.

Read more

Cybersecurity Pulse 2018-05-15

The dispute of the legislation which prevents the federal government of the United States from demanding companies to design their technology with backdoors. 

Read more

CyberSecurity Pulse 2018-05-01

A new malware which utilizes the EternalRomance tool has appeared on the scene along with Monero-mining.

Read more

Apr 2018

CyberSecurity Pulse 2018-04-17

Facebook launched a new program ‘Data Abuse Bounty’ in order to find application developers that are misusing data, after the Cambridge Analytics scandal.

Read more

ElevenPaths Talks: A little of DDoS and the tools to stop the attacks

The denial of service attacks is a worry for both any public entity and business organization whose business processes are network-based. During this #11PathsTalk, we will talk about the different attack techniques and the defense strategies which they use.

Read more

New Season of ElevenPaths Talks

We present season four of webinars featuring our CSAs in which we will talk about cybersecurity and current affairs in the sector. We have a new talk format. Don’t miss out!

Read more

CyberSecurity Pulse 2018-04-03

The USA want to ask visa applicants to provide details of their social networks to extend the background screening nowadays.

Read more

Mar 2018

CyberSecurity Pulse 2018-03-20

A postmortem of the Olympic Destroyer malware used in the PyeongChang Olympics attack reveals a deliberate attempt by adversaries to plant a false flags when it comes to attribution.

Read more

Upgrades to Facebook’s link security

Facebook changes the rules of the “HSTS” with an interesting preload on its own website. To justify this, among other reasons, it mentions our research presented at the BlackHat and RootedCON events.

Read more

Code Talks for Devs: PHP Latch integration

In this last Additional #CodeTalks4Devs, we will explain the integration of Latch in PHP and how easy it was to develop it for everyday applications.

Read more

Cybersecurity, huge obsession of the companies

Our CEO, Pedro Pablo Pérez, declares that virtual raids not only have an impact on economic damages, but also on reputation when they affect the confidence that the environment has in the company.

Read more

Code Talks for Devs Second Season

Second season of webinars dedicated to programming lovers is ready! Access each of them and stay with those that interest you most. Let’s hack!

Read more

CyberSecurity Pulse 2018-03-06

Last February 28th we witnessed the largest DDoS attack ever seen on the GitHub website, reaching a record 1.35 Tbps and 126.9 million packets per second. Access the newsletter and find out what happened.

Read more

Feb 2018

CyberSecurity Pulse 2018-02-20

Numerous types of attacks are affecting cryptocurrency users and many users lose their private keys that protect their wallet. We tell you how to recover them in this biweekly newsletter of our intelligence analysts.

Read more

Interview to Sheila A. Berta in Open Data Security

For Woman International Day, Open Data Security has interview our informatic security analyst Sheila A. Berta. She, with only 22 years, has managed to conquer this field in a self-taught way.

Read more

CyberSecurity Pulse 2018-02-06

The popular fitness tracking app Strava published a 2017 heat map showing activities from its users, but unfortunately, the map revealed locations of the United States military bases worldwide.

Read more

Safer Internet Day 2018

Last Tuesday, February 6th, at ElevenPaths we celebrated the Safe Internet Day. On the occasion of this celebration, we presented several recommendations so the user could have a safe browsing experience on their day-to-day.

Read more

Jan 2018

Telefónica will host the Promálaga Urbanlab at Tabacalera

The Malaga mayor, Francisco de la Torre, and Telefónica’s Territorio Sur director, María Jesús Almazor, have presented this Monday the activities that will take place during the next months at Telefónica’s Promalaga Urbanlab-Espacio.

Read more

Tackling Cybercrime: Top 3 Recommendations for 2018

During 2016 the UK cost of cybercrime was estimated at around £29 billion and in 2017 we saw a 22% growth on that figure. Here are three recommendations to keep your organisation secure.

Read more

La historia de la Dark Web

Existen muchos términos sobre Internet que han surgido en el transcurso de los años, pero sin lugar a dudas los términos Deep Web y Dark Web han sido los que más impacto mediático han tenido.

Read more

CyberSecurity Pulse 2018-01-23

Our intelligent analyst explain how is information stored in a Bitcoin adress and set you a challenge. Sign up for our newsletter and be upday on cybersecurity news.

Read more

CyberSecurity Pulse 2018-01-09

The new year has started with an important story. The vulnerabilities Meltdown and Spectre have put on the table that the architecture of the hardware that makes operate almost all of our systems is likely to have to be reinvented.

Read more

Code Talks for Devs: Limited Secrets

We presented the last chapter of #CodeTalks4Devs serie in wich our developer Javier Espinosa tells how to protect a resource in an Android application. Don’t miss out!

Read more

CDO Challenge

Telefónica’s Chief Data Office unit is looking for new talents who are passionate about technology applied to artificial intelligence in Android development environments. What are you waiting for to apply?

Read more

Dec 2017

ElevenPaths Talks

Closing the third season of ElevenPaths Talks, we present a webinar about Security Forces status to fight against cybercrime, this Thursday at 3.30 pm (CET).

Read more

Proof of Concept: Hidden Networks

Don’t miss our new proof of concept using Python 3.4. It facilitates the task of analysing local and remote machines in searching for traces of connections by USB devices.

Read more

ElevenPaths Talks Special Edition FOCA

Thursday, December 28th, our expert Pablo Gonzalez will talk about the improvements of the new version FOCA Open Source, capable of automating the detection process.

Read more

CyberSecurity Pulse 2017-12-19

The most common question in recent months derived from the rebound in the value of numerous cryptocurrency is: Do I invest or not invest? However, there are different ways to obtain cryptocurrencies and one of them is to start mining.

Read more

ElevenPaths at Black Hat Europe 2017

Our Innovation & Lab team has presented at Black Hat Europe 2017 Conference weaknesses in the way that Firefox, Chrome and IE/Edge implement HSTS and HPKP.

Read more

ElevenPaths Talks: GDPR Regulation

Do you know the new GDPR regulation? This Thursday, our experts Francisco Oteiza and Juan Antonio Gil inform you about the European General Data Protection Regulation, that will be mandatory to comply throughout the European Union on May 2018.

Read more

CyberSecurity Pulse 2017-12-12

In this newsletter, our intelligence analysts comment on the Program for Civilian Cybersecurity Experts aproved by The Army. Don’t miss out!

Read more

CyberSecurity Pulse 2017-12-05

In this newsletter, our intelligents analysts comment on the top ten list of web app vulnerabilities. Don’t miss out!

Read more

Volunteering and training in cybersecurity

On the International Cybersecurity Day, ElevenPaths volunteers, together with the support of the ANAR Foundation, gave some workshops on cybersecurity and cyberbullying to students, teachers and parents.

Read more

Nov 2017

Dumpster diving in Bin Laden’s computers

We’ve analized the hard drives that were seized from Bin Laden’s team in Abbottabad and we discovered the passwords in its secret communication.

Read more

Blockchain attracts big companies

Banks, telecos, insurance companies and other sectors explore the possibilities of a technology that was born with bitcoin. Two of our intelligent analyst talk about it.

Read more

Stories of Telefónica #HackerWomen

Did you know that just 25% of women in the world have a role in technology? We launch the first story of our new series dedicated to women who have a passion and work in technology.

Read more

ElevenPaths Talks

Do you know how mobile security system works? This Thursday, our CSAs Claudio Caracciolo and Rames Sarwat, will talk about the security of our device.

Read more

The «crazy ideas laboratory» of Telefónica in Málaga

Diario Sur dedicates this article to our Innovation and Laboratory team, who is in charge of exploring the future of computer security and testing improvements for all Telefónica Digital products and services.

Read more

TOP 10 Cybersecurity Influencers in Spain

ADECCO brings us the top 10 influencers of information security. Three of our experts are on this list: Chema Alonso, Alejandro Ramos and Pablo Gonzalez.

Read more

Code Talks for Devs: Latch Cloud TOTP in NodeJS and .NET

Did you miss #CodeTalks4Devs about Latch Cloud TOTP in NodeJS and .NET? Our programmer experts, Carlos del Prado and Ioseba Palop, teach you how manage the TOTP tokens as 2FA. Connect to the webinar!

Read more

CyberSecurity Pulse 2017-11-14

In this newsletter, our intelligents analysts research the last disaster of Ethereum’s most important wallets. Don’t miss out!

Read more

ElevenPaths Talks: The Hidden Face of Steganography

Don’t miss out this Thursday at 3.30pm (CET) in our YouTube channel the webinar about steganography techniques and tools to find out the hidden information in several formats and protocols. Take note!

Read more

Google Has A Big Fake WhatsApp Problem – Here’s Why

Our security researcher, Sergio de los Santos, said that whilst Google has patented technology to improve detection of rogue apps, the fraudsters have found new ways to get their software on the official market. Know more about it!

Read more

Investigation report on the cyber identity “Maksim”

Our team of analysts have identified a new threat actor called Maksim that develops malware for Android devices. It has been attributed with the distribution of numerous malicious applications through various websites for purely economic purposes. Download the report!

Read more

Oct 2017

SKrYPtEd New Tool

Did you know that conversations in Skype can be stored in plaintext in a computer´s hard drive? Use SKrYPtEd to decypher them and keep using the software as always. Let’s hack!

Read more

Security Innovation Day 2017: Security Rocks!

Did you miss the annual event of innovation in cybersecurity? We already have all the presentations and videos available. Enter to the official website of the event!

Read more