Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Bluetooth for IoT, much more than handsfree technology Take control of your vehicles with Fleet Optimise
  • Big Data
    • Telefónica Tech at the top of the IoT and Big Data podium 7 Big Data events in May
  • Cybersecurity
    • Fraud against financial institutions with particular incidence in France extends its impact to national territory 3 Key Cyber Security Considerations

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Photo: Christina Wocintechchat.com / Unsplash
      Telefónica Tech

      Cyber Security Weekly Briefing, 9 — 15 July

      Rozena: backdoor distributed by exploiting Follina vulnerability Fortinet researchers have published an analysis of a malicious campaign in which they have detected the distribution of a new backdoor exploiting the...
      Interpretation and Evolution of MITRE ATT&CK: More "Horizontal" Coverage Doesn't Mean Better Protection
      Cytomic Team, unit of Panda Security

      Interpretation and Evolution of MITRE ATT&CK: More “Horizontal” Coverage Doesn’t Mean Better Protection

      The Cytomic team, a unit of Panda Security, explains what the MITRE ATT&CK matrix is based on in order to standardise the behaviour of opponents.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Triki: Cookie Collection and Analysis Tool
      Juan Elosua Tomé

      Triki: Cookie Collection and Analysis Tool

      In July 2020, the Spanish Data Protection Agency, following the entry into force of the European General Data Protection Regulation and several consultations with the European Data Protection Committee...
      Popular Docker Images under Security Scrutiny
      Juan Elosua Tomé

      Popular Docker Images under Security Scrutiny

      Discover the research carried out by our TEGRA cybersecurity centre on this technology's images used in the development of applications.
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Sergio de los Santos

      Facebook signed one of its apps with a private key shared with other Google Play apps since 2015

      Facebook Basics is a Facebook app aimed at countries with poor connectivity, where a free access service to WhatsApp and Facebook is provided. It has been discovered that the Android version...
      #CyberSecurityReport19H1: 45,000 apps removed from Google Play, 2% of them detected by antiviruses
      Innovation and Laboratory Area in ElevenPaths

      #CyberSecurityReport19H1: 45,000 apps removed from Google Play, 2% of them detected by antiviruses

      Currently, there are a number of reports addressing trends and summaries on security. However, at ElevenPaths we want to make a difference. Our Innovation and Labs team has just...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Tell Me What Data You Request from Apple and I Will Tell You What Kind of Government You Are
Sergio de los Santos

Tell Me What Data You Request from Apple and I Will Tell You What Kind of Government You Are

We recently found out that Spain sent 1,353 government requests for access to Facebook user data in the first half of 2020. Thanks to Facebook’s transparency report for the...
Cybersecurity Weekly Briefing November 21-27
ElevenPaths

Cybersecurity Weekly Briefing November 21-27

Qbot as a prelude to Egregor ransomware infections Researchers at Group-IB security company have issued a statement claiming to have found activity linking the Qbot banking trojan (also known as...
Using Development Libraries to Deploy Malware
Diego Samuel Espitia

Using Development Libraries to Deploy Malware

Cybercriminals seek strategies to achieve their objectives: in some cases, it is users’ information; in others, connections; sometimes they generate networks of computers under their control (botnets), etc. Any...
Nonces, Salts, Paddings and Other Random Herbs for Cryptographic Salad Dressing
Gonzalo Álvarez Marañón

Nonces, Salts, Paddings and Other Random Herbs for Cryptographic Salad Dressing

The chronicles of the kings of Norway has it that King Olaf Haraldsson the Saint disputed the possession of the Hísing island with his neighbour the King of Sweden....
A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)
Sergio de los Santos

A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)

In 2008, Kaminsky shook the foundations of the Internet. A design flaw in the DNS made it possible to fake responses and send a victim wherever the attacker wanted....
ElevenPaths Cyber Security News 14-20
ElevenPaths

Cybersecurity Weekly Briefing November 14-20

Malware distribution campaign supplants the identity of Spanish ministries ESET researchers warn of a malware distribution campaign that is impersonating Spanish ministries to distribute a malicious Android application through links...
The Challenge of Online Identity (I): Identity Is the New Perimeter
Andrés Naranjo

The Challenge of Online Identity (I): Identity Is the New Perimeter

We often find ourselves in situations where we are faced with a mission and, as the mission goes on, we realise that the first choices we made were not...
Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later
Gonzalo Álvarez Marañón

Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later

Have you ever played rock, paper, scissors? I bet you have. Well, let’s put the tin lid on it: how would you play through the phone? One thing is...
How Traditional CA's Are Losing Control of Certificates and Possible Reasons Why Chrome Will Have a New Root Store
Sergio de los Santos

How Traditional CA’s Are Losing Control of Certificates and Possible Reasons Why Chrome Will Have a New Root Store

It’s all about trust. This phrase is valid in any field. Money, for example, is nothing more than a transfer of trust, because obviously we trust that for a...
Cyber Security Weekly Briefing November 7-13
ElevenPaths

Cybersecurity Weekly Briefing November 7-13

Links between Vatet, PyXie and Defray777 Researchers from Palo Alto Networks have investigated the families of malware and operational methodologies used by a threat agent that has managed to go...

Navegación de entradas

Previous articles
1 … 22 23 24 … 64
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
Eleven Paths Talks: WordPress in Paranoid Mode
  ¡Regístrate aquí!   El próximo Jueves 30 de Junio nuestro compañero Pablo González impartirá una charla en la que se verá una prueba de concepto realizada en Eleven Paths. Pablo está en...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration