Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • World Environment Day: Green digital transformation as a lever for change The future of Internet of Things
  • Big Data
    • The 6 data-driven pioneers of politics Data as a secure asset
  • Cybersecurity
    • Google’s Passkey is just another nail in the password coffin Human Factors in Cybersecurity: Protect Yourself

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cyber Security Weekly Briefing February 13-19
      ElevenPaths

      Cyber Security Weekly Briefing February 13-19

      ​​Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve years. The flaw,...
      ElevenPaths

      The Intelligent MSSP

      During years, Managed Security Services (MSS) have been the most effective strategy to tackle the increasing and changing threat landscape. Otherwise, some disruptive factors are compelling a new approach...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Blockchain, Cryptocurrencies, zkSTARKs and the Future of Privacy in a Decentralized World
      Gonzalo Álvarez Marañón

      Blockchain, Cryptocurrencies, zkSTARKs and the Future of Privacy in a Decentralised World

      In the Renaissance Italy, duels between mathematicians were common, but not by crossing steels, but by solving difficult problems. One of the hardest bones to crack at the time...
      TheTHE: The Threat Hunting Environment
      Innovation and Laboratory Area in ElevenPaths

      TheTHE: The Threat Hunting Environment, our tool for researchers

      TheTHE, a unique tool within its category that allows analysts and hunters to carry out their research tasks in a more agile and practical way.
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • How to Detect and Protect Yourself from Phishing Attacks in Times of Coronavirus
      ElevenPaths

      How to Detect and Protect Yourself from Phishing Attacks in Times of Coronavirus

      The overinformation caused by the huge amount of news we receive about coronavirus makes it harder to distinguish true from fake emails. This poses a great risk to people’s security, since it...
      The Challenge of Online Identity (I): Identity Is the New Perimeter
      Andrés Naranjo

      The Challenge of Online Identity (I): Identity Is the New Perimeter

      We often find ourselves in situations where we are faced with a mission and, as the mission goes on, we realise that the first choices we made were not...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Has the Office as We Know It Come to an End?
Miguel Ángel Martos

Has the Office as We Know It Come to an End?

2020 has had a difficult start. We have learned that what was “usual” may not be the best. We should reconsider this idea of “the office” as the centre...
Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex
ElevenPaths

Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex

This collaboration provisions the offering of IoT Threat Detection, an incident monitoring and response service for IoT environments.This solution has the capability of learning and modelling the legitimate behaviour...
New TheTHE Version with URLScan and MalwareBazaar Plugins
Innovation and Laboratory Area in ElevenPaths

New TheTHE Version with URLScan and MalwareBazaar Plugins

The first time an IoC lay on your hands. Let’s say it is a hash, URL, IP or a suspicious domain. You need to know some basic information. Is...
Adversarial Attacks: The Enemy of Artificial Intelligence (II)
Franco Piergallini Guida

Adversarial Attacks: The Enemy of Artificial Intelligence (II)

In Machine and Deep Learning, as in any system, there are vulnerabilities and techniques that allow manipulating its behaviour at the mercy of an attacker. As we discussed in...
Cybersecurity Weekly Briefing September 19-25
ElevenPaths

Cybersecurity Weekly Briefing September 19-25

New attack vector for vulnerability in Citrix Workspace Pen Test Partners security researcher Ceri Coburn has discovered a new attack vector for the CVE-2020-8207 vulnerability in Citrix Workspace corrected in...
Blockchain, Cryptocurrencies, zkSTARKs and the Future of Privacy in a Decentralized World
Gonzalo Álvarez Marañón

Blockchain, Cryptocurrencies, zkSTARKs and the Future of Privacy in a Decentralised World

In the Renaissance Italy, duels between mathematicians were common, but not by crossing steels, but by solving difficult problems. One of the hardest bones to crack at the time...
Redefining Cloud Security with SASE
Samuel Bonete

Redefining Cloud Security with SASE

Stop for a moment and think: what percentage of your Internet traffic ends up on websites or traditional browsing and what proportion on SaaS services? If we analyse it...
Cybersecurity for industrial digitalisation: keys to a successful approach
ElevenPaths

Cybersecurity for Industrial Digitalisation: Keys to a Successful Approach

Digital technologies, and in particular what has been agreed to be called IoT (Internet of Things), bring a world of possibilities that organisations of any sector cannot fail to...
When Preventing a Cyberattack Becomes a Vital Decision
Diego Samuel Espitia

When Preventing a Cyberattack Becomes a Vital Decision

In recent years, the number of incidents in critical infrastructure networks and industrial systems has increased significantly. There have been attacks with a high degree of complexity and knowledge...
Analysis of APPs Related to COVID19 Using Tacyt (II)
Andrés Naranjo

Analysis of APPs Related to COVID19 Using Tacyt (II)

We continue with the research started in the previous entry in which we analysed these type of applications with our Tacyt tool. Regarding the application analysed, we can see...

Navegación de entradas

Previous articles
1 … 26 27 28 … 64
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration