Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Safer, but not immune Barcelona, Singapore and Amsterdam: sustainable cities thanks to Internet of Things
  • Big Data
    • 4 times Big Data invaded the world of Fashion How AI and Machine Learning help to develop vaccines
  • Cybersecurity
    • 5G Connectivity and its Impact on Industry 4.0: Maturity and Evolution Introducing the New ElevenPaths Chief Security Envoys (CSEs) for 2020

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cybersecurity Trends Report for 2020 from ElevenPaths
      ElevenPaths

      Cybersecurity Trends Report for 2020 from ElevenPaths

      Discover the technologies and attacks that will most affect security in the coming months in this report.
      Telefónica Tech, recognized with Palo Alto Networks’ SASE, Cloud and Cortex Specializations
      Pablo Alarcón Padellano

      Telefónica Tech, recognized with Palo Alto Networks’ SASE, Cloud and Cortex Specializations

      We are the first partner in Spain awarded with Prisma SASE, Prisma Cloud and Cortex XDR/XSOAR specializations.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Telefónica Tech

      Cyber Security Weekly Briefing, 15 – 21 April

      Google fixes two new actively exploited 0-day vulnerabilities Google has issued new security advisories on the identification of 0-day vulnerabilities affecting the Chrome browser that are being actively exploited. The...
      Telefónica Tech

      Cyber Security Weekly Briefing, 4 – 10 March

      FBI and ICSA Launch Advisory to Combat Royal Ransomware The FBI and ICSA launched the #StopRansomware: Royal Ransomware Cyber Security Advisory on 2 March to help combat this type of...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Photo: Mikayla Mallek / Unsplash
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 August — 2 September

      Critical vulnerability in Atlassian Bitbucket Server and Data Center Atlassian has recently warned its users about a new critical vulnerability affecting the Bitbucket Server and Data Center software, which shall...
      Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?
      Gonzalo Álvarez Marañón

      Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?

      A business is considered agile if it is able to respond quickly to market changes, adapt to maintain stability. However, without cryptography there is no security and without security...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

New Call: ElevenPaths CSE Programme
ElevenPaths

New Call: ElevenPaths CSE Programme

If you are passionate about cybersecurity, join the ElevenPaths CSE programme and enjoy all its benefits. Don't miss it!
Looking for a MDR partner? Beware, not all MDRs are the same
Nikolaos Tsouroulas

Looking for a MDR partner? Beware, not all MDRs are the same

Are you throwing more money than you can afford into your SOC but still failing to detect and respond quickly enough to incidents? Have you suffered the impact of...
China Leads the Race Towards an Attack-Proof Quantum Internet
Gonzalo Álvarez Marañón

China Leads the Race Towards an Attack-Proof Quantum Internet

We are one step closer to reaching the Holy Grail of cryptography. Discover the details in this article.
Ripple20: Internet Broken Down Again
Sergio de los Santos

Ripple20: Internet Broken Down Again

Billions of IoT devices have been affected. However, this is not the first time a catastrophe of this magnitude has occurred.
ElevenPaths

Cybersecurity Weekly Briefing June 20-26

Millions of User Records Exposed on an Oracle Server Security researcher Anurag Sen has found an exposed database containing millions of records belonging to the company BlueKai, owned by Oracle....
Keys to Implementing a 360 Corporate Digital Identity
ElevenPaths

Keys to Implementing a 360 Corporate Digital Identity

We analyze the identity management issues and the characteristics that a comprehensive solution of this kind must have in all organizations.
Anti-Coronavirus Cryptography
Gonzalo Álvarez Marañón

Anti-Coronavirus Cryptography

Discover how your privacy is protected in Covid-19 infection tracing apps in this post.
Most Software Handling Files Overlooks SmartScreen in Windows
Innovation and Laboratory Area in ElevenPaths

Most Software Handling Files Overlooks SmartScreen in Windows

We analyse how this protection component of Windows Defender works with downloaded files.
Cybersecurity Weekly Briefing 6-12 June
ElevenPaths

Cybersecurity Weekly Briefing 13-19 June

Ripple 20 Vulnerabilities in TCP/IP Software JSOF researchers have discovered 19 0-day vulnerabilities, collectively called Ripple 20, in the TCP/IP software library developed by Treck that would affect more than...
Popular Docker Images under Security Scrutiny
Juan Elosua Tomé

Popular Docker Images under Security Scrutiny

Discover the research carried out by our TEGRA cybersecurity centre on this technology's images used in the development of applications.

Navegación de entradas

Previous articles
1 … 31 32 33 … 64
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration