Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Kevin Ashton just asks companies to use the IoT World Energy Saving Day: Efficiency to drive progress
  • Big Data
    • IoT and Big Data in football to enable intelligent decision making Brand Sponsored Data: A creative tool for satisfying customers while meeting tangible customer needs
  • Cybersecurity
    • We Acquire iHackLabs to Boost the Training of Our Ethical Hackers #CyberSecurityPulse: Biggest-Ever DDoS Attack Hits Github Website

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Homeworking and Pandemics: a Practical Analysis on BlueKeep Vulnerability in Spain and Latin America
      Andrés Naranjo

      Homeworking and Pandemics: a Practical Analysis on BlueKeep Vulnerability in Spain and Latin America

      “It is not the strongest of the species that survives, not the most intelligent that survives. It is the one that is the most adaptable to change”.Charles Darwin One of...
      Photo: Christina Wocintechchat.com
      Telefónica Tech

      Cyber Security Weekly Briefing, 1 — 8 July

      Raspberry Robin: worm detected in multiple Windows networks Microsoft has issued a private advisory to Microsoft Defender for Endpoint subscribers, informing about the detection of the Raspberry Robin malware in...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Cyber Security Weekly Briefing 28 August-3 September
      Telefónica Tech

      Cyber Security Weekly Briefing 28 August – 3 September

      PoC available and scans detected for RCE in Confluence On Wednesday 25 August, Confluence published a security advisory to warn of a vulnerability in Confluence Server and Data Center in versions prior...
      What Do Criminals in the Ransomware Industry Recommend so that Ransomware Does Not Affect You?
      Sergio de los Santos

      What Do Criminals in the Ransomware Industry Recommend so that Ransomware Does Not Affect You?

      We all know the security recommendations offered by professionals on malware protection. Frequently: use common sense (personally, one of the least applicable and abstract pieces of advice that can...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Cyber Security Weekly Briefing 20-26 November
      Telefónica Tech

      Cyber Security Weekly Briefing 20-26 November

      Reacharound: possible resurgence of the triple threat Trickbot-Emotet-Ransomware Last January, an international action orchestrated by Europol and Eurojust led to the dismantling of the Emotet infrastructure, a malware widely used...
      Telefónica Tech

      Cyber Security Weekly Briefing 18 – 24 December

      Log4Shell Vulnerability (update) Through the week new details and comments around the vulnerability known as Log4Shell have continued to appear. First, a new denial-of-service vulnerability affecting Log4j2 on versions from 2.0-alpha1...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Cybersecurity Weekly Briefing July 11-17
ElevenPaths

Cybersecurity Weekly Briefing July 11-17

Combining Citrix vulnerabilities to steal user sessions On July 7th, Citrix published a security bulletin to correct up to 11 vulnerabilities. A few days later, a report was released with...
Securing your Cloud Native Applications in AWS in the New Normal
Pablo Alarcón Padellano

Securing your Cloud Native Applications in AWS in the New Normal

The New Cloud Adoption Reality Yes, we are facing a New Normal, and we are living a new cloud adoption reality as well. Enterprise cloud adoption accelerates in face of...
New ElevenPaths DoH Server (Beta) That Filters Out Malicious Domains
Innovation and Laboratory Area in ElevenPaths

New ElevenPaths DoH Server (Beta) That Filters Out Malicious Domains

Discover the DoH server that filters out malicious domains in your browser thanks to our intelligence system.
Cybersecurity Weekly Briefing July 4-10
ElevenPaths

Cybersecurity Weekly Briefing July 4-10

RCE Vulnerability in F5’s BIG-IP (CVE-2020-5902) Last Wednesday a new critical Remote Code Execution vulnerability (CVE-2020-5902 CVSSv3 10)  was published for F5’s Traffic Management User Interface (TMUI). This vulnerability allows...
How to Protect Yourself from Pandemic Cyberattacks Using Free Tools
Diego Samuel Espitia

How to Protect Yourself from Pandemic Cyberattacks Using Free Tools

Find out which free tools you can use to protect your computer from common cyberthreats and how to configure them correctly.
ElevenPaths Radio English #1 - Skills of a Cybersecurity Professional
ElevenPaths

ElevenPaths Radio English #1 – Skills of a Cybersecurity Professional

In this first episode, our CSA Deepak Daswani discusses what a true cybersecurity professional must have to be valuable to companies.
Adversarial Attacks: The Enemy of Artificial Intelligence
Franco Piergallini Guida

Adversarial Attacks: The Enemy of Artificial Intelligence

What happens when the data used by artificial intelligence to predict behaviour is manipulated? Is this an attack vector?
Telefónica Invests in Nozomi Networks, a Leading Company in OT and IoT Security
ElevenPaths

Telefónica Invests in Nozomi Networks, a Leading Company in OT and IoT Security

The investment reinforces an earlier joint services agreement with Nozomi Networks and ElevenPaths, Telefónica Tech’s cybersecurity company
OpenPGP: Desperately Seeking Kristian
Sergio de los Santos

OpenPGP: Desperately Seeking Kristian

Open Source applications run on a server system that has never worked properly. Why does this happen?
ElevenPaths

Cybersecurity Weekly Briefing June 27-July 3

Adobe, Mastercard and Visa Warn of the Need to Upgrade to Magento 2.x Payment providers Visa and Mastercard, together with Adobe, have tried for the last time to convince online...

Navegación de entradas

Previous articles
1 … 30 31 32 … 64
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration