Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Using Smart Chatbots as an IoT interface 10 sensors to create Smart Beaches
  • Big Data
    • Is your AI system discriminating without knowing it?: The paradox between fairness and privacy Audience Selection For Sponsored Data: Precision Is Power
  • Cybersecurity
    • Cyber Security Weekly Briefing, 12 – 16 June SealSign integration with the Azure Key Vault

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Fireless Malware
      Diego Samuel Espitia

      Fileless Malware: A Growing but Controllable Attack

      For some years now, WatchGuard has been generating a report on the security situation detected on the Internet. Following the acquisition of Panda, this report has become even more...
      10 Tips for Secure Homework in Your Company
      ElevenPaths CSAs

      10 Tips for Secure Homeworking in Your Company

      We tell you ten measures you can take to make homeworking secure for your company, employees and customers.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      New report: Twitter botnets detection in sports event

      We all know that a botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform DDoS attacks,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 22 – 28 April

      SolarWinds fixes high severity vulnerabilities In its latest security update, SolarWinds has fixed a total of 2 high-severity vulnerabilities, which could lead to command execution and privilege escalation. The more...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Telefónica Tech

      Cyber Security Weekly Briefing, 21 January – 3 February

      LockBit Green: new LockBit variant Researchers at vx-underground have recently detected that a new ransomware variant, called LockBit Green, is being used by the LockBit ransomware handlers. This new variant...
      Your feelings influence your perception of risk and benefit more than you might think
      ElevenPaths

      Your feelings influence your perception of risk and benefit more than you might think

      Security is both a feeling and a reality —Bruce Schneier Daniel Gardner starts his book The Science of Fear with the shocking history of US September 11 attacks: And so in...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Telefónica Tech, recognized with Palo Alto Networks’ SASE, Cloud and Cortex Specializations
Pablo Alarcón Padellano

Telefónica Tech, recognized with Palo Alto Networks’ SASE, Cloud and Cortex Specializations

We are the first partner in Spain awarded with Prisma SASE, Prisma Cloud and Cortex XDR/XSOAR specializations.
Cyber Security Weekly Briefing April 10-16
ElevenPaths

Cyber Security Weekly Briefing April 10-16

​0-days in Chrome and Edge Security researcher Rajvardhan Agarwal has discovered a 0-day vulnerability in the current versions of Google Chrome and Microsoft Edge, which he has made public via his...
Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security?
ElevenPaths

Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security?

The pandemic has accelerated the transition to a digital life, and with it, cyber-attacks against users and businesses have risen. The most frequent attack, which is the most common...
Top 4 Programming Languages for Beginners
ElevenPaths

Top 4 Programming Languages for Beginners

Have you set yourself new challenges this year but don’t know where to start? How would you like to become an expert in programming? We know that, at first,...
A Trillion-Dollar on Offer to the Puzzle Solver
Gonzalo Álvarez Marañón

A Trillion-Dollar on Offer to the Puzzle Solver

Are you a fan of mathematical puzzles? Well, here’s a lucrative one… but hard to beat! If you discover a method to crack the hashes used in Blockchain, you...
Cyber Security Weekly Briefing April 3-9
ElevenPaths

Cyber Security Weekly Briefing April 3-9

Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files under...
No Pain, No Gain: Let's Hack 2021
ElevenPaths

No Pain, No Gain: Let´s Hack 2021

“No pain, no gain”, you have probably heard this on more than one occasion. An expression that is used endlessly in different environments, in a time when the body...
What is VPN and What is It For?
ElevenPaths

What is VPN and What is It For?

VPN connections are nothing new, they have been with us for a long time, always linked to the business world. The great versatility and its different uses have made...
Cyber Security Weekly Briefing March 20-26
ElevenPaths

Cyber Security Weekly Briefing March 20-26

Analysis of the new cyber-espionage group SilverFish The PRODAFT Threat Intelligence team (PTI) has discovered a highly sophisticated cybercriminal group called SilverFish, which operates exclusively against large enterprises and public...
Cyber Security Mechanisms for Everyday Life
ElevenPaths

Cyber Security Mechanisms for Everyday Life

It is becoming more and more common to find in the general media news related to cyber-attacks, data breaches, privacy scandals and, in short, all kinds of security incidents....

Navegación de entradas

Previous articles
1 … 17 18 19 … 64
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration