Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT and Big Data: the parents of carsharing A world-champion IoT
  • Big Data
    • Consumer Insights: Telling the stories behind the numbers Thanks to AI, the future of video-conferencing is in sight.
  • Cybersecurity
    • Cybersecurity in OT: a need with differences Cyber Security Weekly Briefing, 25 June – 1 July

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cybersecurity Weekly Briefing July 18-24
      ElevenPaths

      Cybersecurity Weekly Briefing July 18-24

      New Emotet Campaign after 5 Months of Inactivity After several months of inactivity, Emotet is back with a massive sending of reply-chain and payment emails, among others, that include malicious...
      Security Innovation Days 2020: The New Era
      ElevenPaths

      Security Innovation Days 2020: The New Era

      Cyber Security in the Digital Transformation Era There is no doubt about it, we are living times of constant changes at all possible levels. There are so many that we are talking about a change of...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Telefónica Tech

      Cyber Security Weekly Briefing, 15 – 21 April

      Google fixes two new actively exploited 0-day vulnerabilities Google has issued new security advisories on the identification of 0-day vulnerabilities affecting the Chrome browser that are being actively exploited. The...
      IoT Device Search Engines: Why Choose if We Can Use All of Them?
      Nacho Brihuega

      IoT Device Search Engines: Why Choose if We Can Use All of Them?

      Nacho Brihuega explains how to use IoT device search engines to detect vulnerabilities and the functioning of a script that will make your research easier.
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Anti-Coronavirus Cryptography
      Gonzalo Álvarez Marañón

      Anti-Coronavirus Cryptography

      Discover how your privacy is protected in Covid-19 infection tracing apps in this post.
      New Call: ElevenPaths CSE Programme
      ElevenPaths

      New Call: ElevenPaths CSE Programme

      If you are passionate about cybersecurity, join the ElevenPaths CSE programme and enjoy all its benefits. Don't miss it!
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Photo: Christina Wocintechchat.com / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 9 — 15 July

Rozena: backdoor distributed by exploiting Follina vulnerability Fortinet researchers have published an analysis of a malicious campaign in which they have detected the distribution of a new backdoor exploiting the...
Photo: Tyler Daviaux / Unsplash.
Sergio de los Santos

Hypocrisy doublespeak in ransomware gangs

The hypocrisy, doublespeak and even, we assume, sarcasm that ransomware gangs display on their websites has no limits. As an anecdote, we are going to show some of the...
Photo: Dan Nelson / Unsplash
Cristina del Carmen Arroyo Siruela

Understanding Digital Certificates

For ordinary citizens, digital certificates are those electronic files or documents that allow them to carry out thousands of legal actions, administrative actions, and they can dispense with having...
Photo: Christina Wocintechchat.com
Telefónica Tech

Cyber Security Weekly Briefing, 1 — 8 July

Raspberry Robin: worm detected in multiple Windows networks Microsoft has issued a private advisory to Microsoft Defender for Endpoint subscribers, informing about the detection of the Raspberry Robin malware in...
Photo: Tai Jyun / Unsplash
Alfonso Ibañez

Edge Computing and Machine Learning, a strategic alliance

By Alfonso Ibáñez and Aitor Landete Nowadays, it is not unusual to talk about terms such as Artificial Intelligence or Machine Learning. Society, companies and governments are increasingly aware of...
Photo: Bruce Mars / Unsplash
Telefónica Tech

Time to start planting digital seeds for the future?

Preparing business operations for the future of work is one of the defining problems of our time. Organisations the world over are now at the stage where their choice of...
Photo: Persnickety Prints / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 25 June – 1 July

​​​Kaspersky investigates attacks on industrial control systems Kaspersky researchers have investigated an attack campaign targeting industrial control systems (ICS) of telcos and industrial companies in several countries on the Asian...
Photo: Ed Hardie / Unsplash
Aarón Jornet

How Lokibot, the malware used by Machete to steal information and login credentials, works

Machete is a group dedicated to information theft and espionage. It uses various tools, including LokiBot.
Photo: Lucian Novosel / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 18 – 24 June

​​Microsoft Office 365 and Cloudflare services went down worldwide Multiple web services were interrupted worldwide last Tuesday. The source of these incidents was Microsoft Office 365 on the one hand...
Photo: ThisIsEngineering / Unsplash
Cristina del Carmen Arroyo Siruela

Women’s Engineering Day: Building New Paths

The Women's Engineering Society (WES) launched the Women's Engineering Day initiative in the UK on June 23, 2014

Navegación de entradas

Previous articles
1 … 12 13 14 … 64
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration