Don’t miss out the new plugins that we have designer for our mos famous tool FOCA: HaveIBeenPwned and SQLi.
Don’t miss out on the interview with our intelligence analyst Yaiza Rubio on TVE’s “Aquí hay trabajo” program. Starting in the minute 7.46.
The certificate registry which contains a history of the usage, validity periods and expiration dates, actually offers an apt data set suitable for different data mining processes.
During the Madrid Woman’s Week event, the intelligent analyst Yaiza Rubio, and the Chairman, Chema Alonso, have made several statements about equality between women and men.
Learn with our CSA Manager, Rames Sarwat, and a special guest, Dr. Alfonso, a reputed cryptography expert, to understand the state-of-the-art quantum technology and its expected evolution in the coming years. Do not miss it!
The developer, Javier Espinosa, explains how easy it is to integrate Latch’s security in applications. Go to the community and speak with our experts about your doubts and suggestions.
Evrial is a cryptocoin malware stealer discovered by our researchers which takes control of the clipboard to get “easy money”.
In this first #CodeTalks4Devs Additional webinar, the expert, Ioseba Palop explains to us how to integrate Latch in the .NET platform.
Telefónica partners with McAfee to protect customer devices embedding its technology in the home Internet routers
Telefónica and McAfee have announced an agreement to reinforce the online security for Telefónica’s broadband and mobile customers across its markets in Europe and Latin America.
For Woman International Day, Open Data Security has interview our informatic security analyst Sheila A. Berta. She, with only 22 years, has managed to conquer this field in a self-taught way.
We bring you the last three episodes of the first Code Talks for Devs season. We will dig into the different integrations of Latch on NET., JAVA y PHP platforms with our experts.
Don´t miss Pablo San Emeterio’s interview , one of our experts and Chief Security Ambassador, who talks about about what cybersecurity is and the risks of the internet, among others.
UAC-A-Mola is a framework, designed to investigate, detect, explore and mitigate the weaknesses called UAC bypass. These weaknesses are found in Microsoft Window operating systems.
The Malaga mayor, Francisco de la Torre, and Telefónica’s Territorio Sur director, María Jesús Almazor, have presented this Monday the activities that will take place during the next months at Telefónica’s Promalaga Urbanlab-Espacio.
UAC-A-Mola, new framework designed for researching, detecting, exploiting and solving UAC bypass weaknesses
UAC-A-Mola allows automatizing the detection of a UAC bypass in a computer with Windows 7/8/8.1/10. This new tool can run customizable modules that allow automatizing researching looking for UAC.
During 2016 the UK cost of cybercrime was estimated at around £29 billion and in 2017 we saw a 22% growth on that figure. Here are three recommendations to keep your organisation secure.
Intelligence analyst Félix Brezo mentions that, unlike the euro or the dollar, legal currencies issued by a central bank, cryptocoins follow a “decentralized philosophy”.
In this webinar, Javier Alcaraz tells us his Final Degree project in which he explains how to integrate our Latch technology into devices, like the router, to cope with the cyber threats of the network.
One of our hacker womens and developer, Carmen Torrano, will introduce a case study based on the analysis of algorithms applied to Machine Learning.
With his team of hacker, Sergio de los Santos runs our Innovation Lab in Malaga. He has followed the clues to Bin Laden and discovered many things.
Álvaro Núñez-Romero, one of our ElevenPaths experts, show us in this webinar how to apply Latch to the physical world through a small microcontroller.
Don’t miss out the interview of the first spanish hacker participating in the most important cybersecurity conference of the world.
With the elections in Catalonia just around the corner, our expert, Pablo San Emeterio, affirms that any electronic device connected to the Internet can be a victim of a cyberattack.
Diario Sur dedicates this article to our Innovation and Laboratory team, who is in charge of exploring the future of computer security and testing improvements for all Telefónica Digital products and services.
Did you miss #CodeTalks4Devs about Latch Cloud TOTP in NodeJS and .NET? Our programmer experts, Carlos del Prado and Ioseba Palop, teach you how manage the TOTP tokens as 2FA. Connect to the webinar!
Our Innovation and Laboratory director, Sergio de los Santos, said that recognition and voice processing has been among us for a long time, any application can process what is being said. Go to ‘El Confidencial’ and learn about it!
Our security researcher, Sergio de los Santos, said that whilst Google has patented technology to improve detection of rogue apps, the fraudsters have found new ways to get their software on the official market. Know more about it!
Don’t miss out this Thursday at 3.30pm (CET) in our YouTube channel the webinar about steganography techniques and tools to find out the hidden information in several formats and protocols. Take note!
Our team of analysts have identified a new threat actor called Maksim that develops malware for Android devices. It has been attributed with the distribution of numerous malicious applications through various websites for purely economic purposes. Download the report!
Learn with our experts Álvaro Núñez-Romero and Pablo González how to created your own DirtyTooth in a Raspberry Pi thanks to the basic installation package that we have developed in our inovation lab. Don´t miss it!
Learn in this webinar with our CSAs Jorge Rivera and Rames Sarwat, together with a special guest, about managed security and the evolution to the concept of Intelligent MSSPs. Don’t miss it!
We explain how to detect a sucession of events, not necessarily security related, giving hints to consider a Windows Machine jeopardized, using for that purpose Security Monitoring product. Check it out!
Don’t miss out the interview with our CEO Pedro Pablo Pérez, and Juan Antonio Gómez Bule, president of Walhalla Datacenter Services in Forbes magazine. They talk about the cyber attacks that we are currently suffering. Access to the full interview
In this session, our experts Álvaro Núñez-Romero and Pablo González discuss about the protection of information in messages and files through bits code by using our Latch’sApp tool. Hit play!
Thanks to the information provided by BitSight, we presented this study which aim is based on showing the state of cybersecurity in Spanish companies but also those companies which are included in the IBEX 35. Download here!
In this webinar our CSAs Pablo San Emeterio and Diego Espitia, together with a special guest, will teach general concepts of monitoring and alert systems management, and implementation issues. Find out more!
Julio García, ElevenPaths expert, has developed a tool that is able to follow any user’s location in Tinder, a simple dating app, and show it in full detail on a map. Discover it!
Our Chairman Chema Alonso says that companies take up to 6 months to detect intruders in their networks
Go to the interview in which our ethical hacker talks about the current situation of computer atacks. Don’t miss any detail!
Are we again in the presence of an ingenious marketing name or something that makes a difference in the world of the IoT? Our CSAs, Carlos Ávila y Claudio Caracciolo tell us! Learn more!
On this report we explain how the German government has been affected by cyberattacks, phising and miss information all leading to the October 24th elections. Download it here!
The best known hacker in Spain talks about corporations, complex cyber atacks and being on holidays during the WannaCry attack. Don’t miss it!
Our experts Diego Espitia and Rames Sarwat will speak with a special guest about Artificial Intelligence and Machine Learning detailing the innovation from both optics applied to security. Find out!
The first webinars series of programming webinars for developers with the most geeks theme.
If you have hacker spirit, take part in our free online seminar where we discuss about programming languages, code, technical integrations, APIS… and more.
Our experts Claudio Caracciolo and Jorge Rivera, with an special guest, will analyze the pros and cons of Defensive Security and Offensive Security. Find out more!
Yaiza Rubio, the first Spanish woman to participate in the macro encounters of hackers DefCON and Black Hat
Don´t miss the ABC interview with our intelligence analyst and hacker Yaiza Rubio. She has become the first Spanish woman to participate in the two more importants events of hackers in Las Vegas: DefCON and Black Hat. Find it!
Don’t miss our selection of events for the entire month where you can take advantage of the knowledge shared by experts in the ecosistem. ¡Check more info here!
Our experts Víctor Mundilla and Álvaro Rodríguez tell us about mASAPP, the new platform developed by ElevenPaths for the autonomous discovery and analysis of mobile applications security. Don´t miss it!
This report reflects the possibilities provided by the so-called Hidden Network and how these can be identified and focused on protection of these issues inside a corporate network. Download it!
Chema Alonso interviews our intelligence analyst Yaiza Rubio who talks about the most important event of the year in cybersecurity, DefCON & BlackHat. She will also explain how she began in the digital world. Meeting our female hacker!
The agreement between Elevenubex’ to protect against a comprehensive set of dPaths and Subex will result in the new technology solution ’Telefonica FMaaS Powered by Sigital risks and threats, along with a library of fraud detection processes.
What are the differences between NOC, SOC and CyberSOC? ¿What are their functions and objectives? Our CSAs Pablo San Emeterio and Gabriel Bergel, together with a special guest, will solve this questions in this webinar. Don’t miss out this Talk!