“We cannot keep ourselves isolated, we cannot say that we are no longer connecting to the internet. Education in security is paramount.” Read the full article in the interview with Gabriel Bergel, cybersecurity expert and ElevenPaths’ CSA in Chile.
In this research, our experts at ElevenPaths developed a proof of concept to show how simple it is to route a victim’s traffic though the tor network. ¡Download the research!
ElevenPaths Talks: The top 10 main security controls that can’t be missed in a company by Leandro Bennaton.
In this webcast our cybersecurity expert and CSA of ElevenPaths in Brazil will speak about the standards and most important studies on security controls. Sign up for the webcast!
Every day we add more features to our Latch service and instances is one of the newest features. In this article you will learn the entire process in detail. Try it with your Latch app.
The ElevenPaths’ Analyst Team presents you a quarterly update on the latest tendencies of cyber-attacks in financial sector. This report analyzes the current trends related to financial phishing and banking malware. Download it!
Don’t miss out on this interview of our hacker and CSA in Argentina carried out by Security Affairs. Claudio Caracciolo shares his favorite hacking tools and expresses his vision on cyber-weapons and the industries that are most exposed to cyber-attacks.
You can now watch all the videos from the day of interviews within the Microsoft Sessions Latam 2016 program. Do not miss out on the interview about the attackers and the anatomy of an attack, carried out by Chema Alonso.
Are you interested in security analysis? Diego Espitia will reveal the differences between infrastructure analysis, web and code review analysis. Take note: your next appointment with our cybersecurity experts is on Thursday, 4th August.
ElevenPaths’ analyst team updates you on vulnerability trends. Don’t miss out on this new research report where you will find the analysis corresponding to the first six months of 2016. Download the full report here!
Telefonica joins the decision-making bodies of the European Cyber Security Organization as the only telco
Pedro Pablo Pérez García, Telefonica Global Security Managing Director and CEO of ElevenPaths will represent Telefonica in this organization that has over 130 partners including large companies, research centers, business associations, public administrations and technology users.
It is a proven fact that when searching in eMule and other file-sharing clients of the same type, there hides malicious software under cracks, serials, executables, etc. We unravel the details of our experiment in this research report. Download here.
In this newspaper, Chema Alonso, the most important hacker in Spain, will be publishing the articles that he reads on cybersecurity blogs so that you can get to know the sources he uses to be updated on a daily
More than 30.000 users of the Working Day Suite app will be able to protect the access to the platform with Latch, a digital safety switch by ElevenPaths, that protects online services and accounts.
Are you an IT professional who wants to improve his professional competitiveness, likes to delve into the hacking and simply enjoys it? This course may be interesting for you!
At ElevenPaths we carried out a research on HummingBad, the parasite which infects millions of Android terminals in the world. As a result, we concluded that Hummer is HummingBad, and we found it out thanks to Tacyt.
Alise Devices is a company that created Liliac technology with which we have been working for 3 years. Liliac obtained the Honorable mention for technology based patents at MadR + D Awards. Congratulations to the whole team!
“Conventional terrorism, as it has been known up to now, doesn’t exist already”, states Adolfo Hernandez – hacker, co-founder of the “think thank Thiber” and cybersecurity advisor at ElevenPaths.
Did you know Gmail is being used as C&C to exfiltrate corporate data? Gmail and other email providers’ domains may be being used to take control of systems of an organization. Download the research and get informed about the details!
Have doubts whether your have been hacked? Following a few steps you can make sure you aren’t among cyber-attacks victims and that your personal data remains confidential.
The trick of stealing accounts when playing with Siri is over. Apple terminated a leak that allowed to take advantage of those iPhones which had Siri enabled on the locked screen. Chema Alonso tells us about it on his blog.
In this article lainformacion.com gathers concerns about cybersecurity and opinions of the hacker and the head of Big Data Department of Telefónica at IMPACT Talk Conference, organized by the European University of Madrid.
Social media marketing has been adopted by the companies for the it benefits, however it also makes them face the threats of security bugs. How can one avoid them?
On June 21st, a Twitter user @0x2Taylor posted a message which outlined the data disclosure of 41 million account credentials belonging to Twitter. Our analyst team informs you about this new case of the latest data leakage. Download the report!
Don’t miss out on the interview about the issues related to the user safety, that BillionBytes gave to Chema Alonso – one of the most famous Spanish hacker.
The interview that BitActual gave to Chema Alonso is one of the most read articles. Learn all you need to know about computer security here.
The BozkurtHackers cyber identity is responsible for leaking the data, originated from banks based in United Arab Emirates, Bangladesh and Nepal, both through the deep web forums and Twitter. Our team of intelligence analysts unravels its true identity!
Did you know that browsing through Tor is not enough to guarantee anonymity? At ElevenPaths we found out that some gateways linked to the contents of the TOR network may disclose your identity.
Our analyst team has a new case for you! This time it is about the analysis of the Turkish City Bank data leakage. Download the report!
Telefónica is the first telephone operator to offer this service at a national level. Thanks to Mobile Connect, companies will be able to provide more security on the Internet.
The cyber identity peace_of_mind (also Peace and firstname.lastname@example.org) is responsible for selling the databases belonging to LinkedIn, Myspace, Tumblr, and VK among others. It also belongs to a group, related to the exploit kits sale in the Tor network.
Agreement extends 15 year relationship with Telefónica to deliver seamless and adaptive security from IoT to Cloud Networks.
“The banks will reject granting loans on the basis of the information obtained from Facebook. Don’t miss out on this interview!
My team and I are working on creating innovative technologies to build the security service portfolio which Telefónica offers to its customers worldwide.
Chema Alonso unraveled the key points of future trends in the cybersecurity field as well as some details about his persona. Don’t lose out this interview!
Con motivo del evento OpenExpo 2016, Autentia realizó una pequeña entrevista a Chema Alonso en la que nos habla de las principales vulnerabilidades de Wordpress y como fortificar las identidades de su usuarios. ¡Dale al play!
Chema Alonso “a hacker is something ideal, that many dream to be, although usually people give it a pejorative connotation”.
Our analyst team updates you on the biggest data breaches trends. Today we present you the report corresponding to the first quarter of 2016. Download it!
In the third Security Day together we announce with our experts and partners the new strategic alliances and technology integrations. During last three years this event has become a reference in cybersecurity and ICT sector at the national level.
Chema Alonso: “It is truly dangerous to leave your children alone on the Internet with the computer in their room, without knowing what they do and with whom”
Chema Alonso believes that human beings are prone to falling into addictions of any kind and taking them to extremes. This and much more in Chema Alonso’s latest interview.
The so-called premium version comes across a suspicious message offering some tasty functions. Javier Espinosa, ElevenPaths’ software engineer tells you how to take on this new fraud.
Today we celebrate Security Day under the motto Security Evolution. Every year ElevenPaths presents with its experts and partners new technological integrations. In three last years it has become a reference in the sector of cybersecurity and ICT at the
New information belonging to the Invest Bank of the United Arab Emirates was disclosed to the public through Twitter on May 6, 2016. Learn about it from our analysts!
Don’t miss the PlayGround interview with Chema Alonso, “the most famous hacker in Spain”. He will tell us about online kidnapping, Snapchat and why espionage in the web affects us all.
El “hacker” Chema Alonso sugiere en la UCLM auditorías de seguridad permanentes para prevenir ataques informáticos
Prácticamente todas las empresas y organizaciones del mundo tienen puntos vulnerables en sus sistemas informáticos y deberían mantener auditorías de seguridad constantes para evitar ciberataques. Así lo ha afirmado Chema Alonso de ElevenPaths en la Universidad de Castilla-La Mancha
On 3 April, 2016 a database, associated with the Central Population Management System, that depends on the Turkish Ministry of Interior (MERNIS in Turkish) and that contained 49,611,709 records related to Turkish citizens, was leaked. Find out more from our
On 3 May, 2016 the database leak of a company-outsourcer of technological profiles in Philippines, became public. Learn more from our analysts!
Plugin that allows to control Calls in Asterisk Servers with Latch. ¡Learn more on our YouTube channel!