Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Energy efficiency switches to the Smart side A much safer world is possible thanks to IoT
  • Big Data
    • Can Big Data reshape the Outdoor Media sector? 7 Big Data and AI predictions for 2018
  • Cybersecurity
    • Cyber Security Weekly Briefing 26 March- 1 April Top 4 Programming Languages for Beginners

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later
      Gonzalo Álvarez Marañón

      Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later

      Have you ever played rock, paper, scissors? I bet you have. Well, let’s put the tin lid on it: how would you play through the phone? One thing is...
      ElevenPaths

      #CyberSecurityPulse: Dude, Where Are My Bitcoins?

      Numerous types of attacks are affecting cryptocurrency users: families of malware that steal wallets, phishing attacks that try to forge platforms where users manage their bitcoins, applications that use...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?
      Sergio de los Santos

      Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?

      Conti, the fastest ransomware, is just one example of how this threat is evolving. Discover what tricks it uses and why in this article.
      Telefónica Tech's Cybersecurity Unit Becomes Part of The European Commission's Cybersecurity Atlas
      Innovation and Laboratory Area in ElevenPaths

      Telefónica Tech’s Cybersecurity Unit Becomes Part of The European Commission’s Cybersecurity Atlas

      Telefónica Tech’s Innovation and Laboratory Area in cyber security has been included as part of the European Commission’s Cybersecurity Atlas, a knowledge management platform that maps, classifies, visualises and...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ElevenPaths

      Cybersecurity Weekly Briefing August 1-7

      Database of +900 Pulse Secure VPN Enterprise Servers An underground forum post has been detected showing the existence of a database containing data collected on more than 900 Pulse Secure...
      Cybersecurity Weekly Briefing 30 May-5 June
      ElevenPaths

      Cybersecurity Weekly Briefing 30 May-5 June

      Security Breach in 8Belts vpnMentor researchers discovered in mid-April a data breach in the 8Belts language learning platform due to an improper configuration on an Amazon Web Services S3 bucket....
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Telefónica Tech, recognized with Palo Alto Networks’ SASE, Cloud and Cortex Specializations
Pablo Alarcón Padellano

Telefónica Tech, recognized with Palo Alto Networks’ SASE, Cloud and Cortex Specializations

We are the first partner in Spain awarded with Prisma SASE, Prisma Cloud and Cortex XDR/XSOAR specializations.
Cyber Security Weekly Briefing April 10-16
ElevenPaths

Cyber Security Weekly Briefing April 10-16

​0-days in Chrome and Edge Security researcher Rajvardhan Agarwal has discovered a 0-day vulnerability in the current versions of Google Chrome and Microsoft Edge, which he has made public via his...
Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security?
ElevenPaths

Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security?

The pandemic has accelerated the transition to a digital life, and with it, cyber-attacks against users and businesses have risen. The most frequent attack, which is the most common...
Top 4 Programming Languages for Beginners
ElevenPaths

Top 4 Programming Languages for Beginners

Have you set yourself new challenges this year but don’t know where to start? How would you like to become an expert in programming? We know that, at first,...
A Trillion-Dollar on Offer to the Puzzle Solver
Gonzalo Álvarez Marañón

A Trillion-Dollar on Offer to the Puzzle Solver

Are you a fan of mathematical puzzles? Well, here’s a lucrative one… but hard to beat! If you discover a method to crack the hashes used in Blockchain, you...
Cyber Security Weekly Briefing April 3-9
ElevenPaths

Cyber Security Weekly Briefing April 3-9

Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files under...
No Pain, No Gain: Let's Hack 2021
ElevenPaths

No Pain, No Gain: Let´s Hack 2021

“No pain, no gain”, you have probably heard this on more than one occasion. An expression that is used endlessly in different environments, in a time when the body...
What is VPN and What is It For?
ElevenPaths

What is VPN and What is It For?

VPN connections are nothing new, they have been with us for a long time, always linked to the business world. The great versatility and its different uses have made...
Cyber Security Weekly Briefing March 20-26
ElevenPaths

Cyber Security Weekly Briefing March 20-26

Analysis of the new cyber-espionage group SilverFish The PRODAFT Threat Intelligence team (PTI) has discovered a highly sophisticated cybercriminal group called SilverFish, which operates exclusively against large enterprises and public...
Cyber Security Mechanisms for Everyday Life
ElevenPaths

Cyber Security Mechanisms for Everyday Life

It is becoming more and more common to find in the general media news related to cyber-attacks, data breaches, privacy scandals and, in short, all kinds of security incidents....

Navegación de entradas

Previous articles
1 … 17 18 19 … 64
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
Latch USB Monitor: New tool to monitor PNP devices with Latch
Latch USB Monitor is a tool that monitors Plug ‘n Play device (PNP) changes in Windows and gives the user the possibility of tracking incoming devices, and react accordingly...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration