Cyber Security Reports

de la ()

Trends

VULNERABILITIES

CyberSecurity Report 2021H1, Security Status Report

From mobile security to vulnerability analysis, from relevant news to privacy analysis, learn about the risks of the current scenario.

(Only available in Spanish).

Trends

2020

Cyber Security for Small and Medium-Sized Companies

Discover the keys that SMEs should follow to continue with their businesses without incident in the "new normal".

Trends

2020

Is the Oven Ready for Cookies?

Analysis of the regulatory compliance of cookies in Spain based on the 100 most visited websites.

2020

From MSS to MDR and Beyond

Learn about the importance of MDR (Manage, Detection and Response) services in cybersecurity in the medium-short term in this paper.

Trends

2020

Cyber Security for Industrial Digitalisation

Discover the keys to successfully addressing OT security in this new paper.

2020

SASE: The Future of Networks and Security is Now Here

Discover in this paper the keys of this new model for delivering network and security services.

Trends

VULNERABILITIES

2020

CyberSecurity Report 2020H1, Security Status Report

From mobile security to cyber risk, from the most relevant news to the most technical and common vulnerabilities, learn about the risks of the current scenario.

Trends

VULNERABILITIES

COVID-19: Insight from the Telco Security Alliance

Three of the members of the TSA have joined together to create this report through their respective cybersecurity units. The report covers noteworthy discoveries related to COVID-19 in the cyber domain.

2020

Keys to Implement a 360º Corporate Digital Identity

Discover in this paper our proposal to correctly manage the corporate identity.

TOOLS

2020

What to Expect from MDR & MDR Providers

Discover the importance of having a Managed Security Service Provider specialized in MDR.

VULNERABILITIES

2020

Report about SmartScreen, a Windows Defender Component

We analyse how SmartScreen works with file processing software to better understand the mechanisms that activate this protection component developed by Microsoft.

Trends

2020

Dark Commerce. Exploring the Cybercrime Industry and its Business Models: Part I

We present this interesting report made together with Blueliv in which we analyze the main services offered by cybercriminals on the net.

Trends

2020

Cyber Security Trends for 2020

What attacks are we going to see over the next few months? What technologies will be most important in relation to cyber security? We tell you in this new report.

2020

The Telco Security Alliance Bolsters Threat Detection Capabilities Through Shared Intelligence

The Telco Security Alliance today announce new collaborative efforts to detect and eliminate threats from customer environments. We are working together, sharing threat intelligence and IoCs so they can help organizations remain resilient as the threat landscape evolves.

VULNERABILITIES

TOOLS

2020

APTualizer (II): Tools to Detect and Remove the Necurs Rootkit

Second part of the report on APTualizer, the malware that patches Windows. In this issue, we look at Necurs, a giant malicious botnet that controls around 6 million infected computers around the world.

Trends

2020

Trend Report: Hacktivist Cyberthreats 2019

The threats of so-called hacktivism became very important during the last year supporting ideological movements. In this report we highlight the most relevant ones.

2020

Global DDoS Threat Report by Telco Security Alliance

The Global DDoS Threat Report 2019 provides detailed expert analysis of the global DDoS threat landscape and provides factual data on monitored global and regional attacks seen by Netscout’s Advanced Threat Level Analysis System.

Trends

2020

CyberSecurityReport19H2, Cyber Security Status Report

Second part of the report developed by our Innovation and Laboratory team that analyses the highlights of the second part of 2020

VULNERABILITIES

2019

Discovering Microsoft's Vulnerabilities: Who is Who

We analyze how many bugs Microsoft finds in its own code and how many bugs are found by third parties like Google or Qihoo.

Trends

VULNERABILITIES

2019

Trend Report: Binary Leaks

Our CSA team analyzes the current security status of applications provided by Spanish-speaking governments.

Only available in Spanish.

VULNERABILITIES

2019

APTualizator: the Targeted Malware Patching Windows

An interesting analysis of CSIRT-SCC in collaboration with ElevenPaths Innovation and Laboratory.

Trends

2019

CyberSecurity Report 19H1: Security Status Report

Our Innovation and Laboratory team launches our own cybersecurity report that synthesizes the highlights of the first half of 2019.

2019

Artificial Intelligence: Applicability of GANs and Autoencoders in Cyber Security

New investigation from the department of Mad Ideas of CDO on the application of Artificial Intelligence in cybersecurity.

Trends

2019

Cyber Security Trends Report 2019

New report in which we analyze the evolution of the threats of the digital world and the new challenges we will face in 2019.

Trends

2019

Cyber Security Report 18H2, our New Periodic Report on Cyber Security

Our Innovation and Labs team has just launched an own cybersecurity report, summarizing the most significant information from the second semester of 2018.

VULNERABILITIES

2018

Twitter Botnets Detection in Sports Events

We analyze two different Twitter conversations and identified the behavior of several groups of profiles with automatic and non-standard activity.

VULNERABILITIES

2018

Global Banking Cyber Report

This report aims to give an overview of some of the digital threats for one of the most trusted and important industries: the banking industry.

Trends

2018

How Wiper Malware Affects Middle East and South America

Two of the members of the Telco Security Alliance, Etisalat and Telefonica detect similar malware and are willing to provide CyberSecurity Threat advisory to protect critical information from Cyber Threats.

Trends

2018

What Does Metadata Reveal About the States in Latin America?

We have utilized public documents detected in government domains, of which can be accessed by any network user, through search engines or directly on the different entities’ websites.

VULNERABILITIES

TOOLS

2018

UAC Bypass & Research with UAC-A-Mola

UAC-A-Mola is a framework, designed to investigate, detect, explore and mitigate the weaknesses called UAC bypass. These weaknesses are found in Microsoft Window operating systems.

(Only available in Spanish)

VULNERABILITIES

2017

Windows Malicious Events Detection with Security Monitoring

The Microsoft Windows operating system generates a large quantity of events that are described in the technical documentation published by Microsoft in its knowledge base, TechNet.

Trends

VULNERABILITIES

2017

State of Cyber Security in Spanish Companies

Are Spanish companies and organizations secure? Are we more or less secure than other countries around us? Is the average increase in security investment sufficient? Do we invest our resources in security efficiently?

VULNERABILITIES

2017

Threats to the Electoral Process in Germany

On this report we explain how the German government has been affected by cyberattacks, phising and miss information all leading to the October 24th, 2017 elections.

VULNERABILITIES

2017

Hidden Networks: Detecting Hidden Networks Created with USB Devices

Many companies and government agencies today have communications isolated networks or with data flow restricted through different networks.

VULNERABILITIES

2017

Twitter Interaction During UK Elections

In this report we analyse the Twitter conversations during June 8 2017, the day when the UK general elections took place.

VULNERABILITIES

2017

Threats to the Iranian Electoral Process

We present this section with reports about electorals cyber risks. In this installment we show you Iran case.

Trends

VULNERABILITIES

2017

“Financial Cyber Threats Q1 2017″ Conducted with Kaspersky Labs and Telefónica

Our analyst team gives you a quarterly update on the latest tendencies of cyber attacks in financial sector.

Trends

VULNERABILITIES

2017

Vulnerabilities Trends in the Second Semester of 2016

ElevenPaths’ analyst team updates you on vulnerability trends. Don’t miss out on this new research report where you will find the analysis corresponding to the second semestre of 2016.

Trends

VULNERABILITIES

2017

The Biggest Data Leaks of the Final Third of 2016

Our analysts team updates you on the biggest data breaches trends. This time we bring you the report corresponding to the final third of 2016.

Trends

VULNERABILITIES

2017

“Financial Cyber Threats Report Q4 2016″ Conducted by Kaspersky Labs and Telefónica

Our analyst team gives you a quarterly update on the latest tendencies of cyber attacks in financial sector. You can now download the full Financial Cyber Threats Q4 2016 Report conducted by Kaspersky Labs and the ElevenPaths’ Analyst Team.

Trends

2017

HPKP and HSTS. Global Analysys and Implementation

HSTS and HPKP are relatively recent protocols, aimed to enforce HTTPS connections and certificate pinning over HTTP.

Trends

VULNERABILITIES

2016

“Financial Cyber Threats Report Q3 2016″ Conducted by Kaspersky Labs and Telefónica

Our analyst team gives you a quarterly update on the latest tendencies of cyber attacks in financial sector. You can now download the full Financial Cyber Threats Q3 2016 Report conducted by Kaspersky Labs and the ElevenPaths’ Analyst Team.

Trends

VULNERABILITIES

2016

The Biggest Data Leaks of the Second Third of 2016

ElevenPaths’ analyst team updates you on the largest data breaches trends. Don’t miss out on this research report where you will find the analysis corresponding to the second third of 2016.

VULNERABILITIES

2016

“Financial Cyber Threats Q2 2016″ Conducted by Kaspersky Labs and Telefónica

ElevenPaths’ Analyst Team gives you a quarterly update on the latest tendencies of cyber attacks in financial sector. You can now download the full Financial CyberThreats Q2 2016 Report conducted by Kaspersky Labs and the our analyst team.

Trends

VULNERABILITIES

2016

Vulnerability Trends of the First Half of 2016

ElevenPaths’ analyst team updates you on vulnerability trends. Don’t miss out on this new research report where you will find the analysis corresponding to the first six months of 2016.

Trends

VULNERABILITIES

2016

RansomCloud O365 Report

Discover how could be the new generation of Ransomware and protect yourself in time.

Trends

2016

The Biggest Data Leaks of the First Third of 2016

Our analyst team updates you on the biggest data breaches trends. Today we present you the report corresponding to the first third of 2016.

Trends

VULNERABILITIES

2016

"Financial Threats Report Q1 2016″ Conducted by Kaspersky Labs and Telefónica

Our analyst team gives you a quarterly update on the latest tendencies of cyber attacks in financial sector.

VULNERABILITIES

2016

Cyber-Insurance: Cyber Risk Transfer in Spain

Download the report “Cyber-Insurance: the cyber risk transfer in Spain“.

Only available in Spanish

2016

Demographic Analysis of Google Play

This report shows that Tacyt had dissected a total of 3,365,527 applications from the Google Play Store, of which only 2,438,864 remained available for download on the market.

VULNERABILITIES

2016

Cyberextortion, a Growing Industry

Download the new report that discover there is an increasing tendency towards aggression in numerous cyber-attacks, notably those using some method of extortion in particular.

VULNERABILITIES

2016

Scope, Scale and Risk Like Never Before: Securing the Internet of Things

Download our new Whitepaper “Scope, scale and risk like never before: Securing the Internet of Things” by Telefónica and ElevenPaths’ Analyst Team.

Trends

VULNERABILITIES

2016

Trend Report: Vulnerabilities 2014-2015

You can now download the 2014-2015 vulnerability trends report including the data of over 100 companies, thus representing the main activity sectors while showing a global reach.

Trends

VULNERABILITIES

2016

“Financial Threats Report Q4 2015″ Conducted by Kaspersky Labs and Telefónica

You can now download the full Financial CyberThreats Q4 2015 Report conducted by Kaspersky Labs and the ElevenPaths’ Analyst Team.

YOU HAVE SEEN OF Reports

LOAD MORE
ELEVENPATHS IN SOCIAL NETWORKS

ElevenPaths

In ElevenPaths, Telefónica Group’s global cyber security company, we believe that a more secure digital world is possible. We support our clients with their digital transformation, creating disruptive innovation in cyber security so we provide the necessary privacy and trust in our daily digital lives.

Follow us on LinkedIn

ElevenPaths

The goal of ElevenPaths is to create innovative products that solve current and future security problems that make digital life more secure for everyone. On our YouTube channel you will find more information about our products and services, interviews, events and activities. Join the team!

Follow us on YouTube

ElevenPaths

We are @Telefónica's Global Cyber Security Company. We deliver disruptive #innovation in #cyber security to build a more secure world.

Follow us on Twitter