Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Big Data and Artificial Intelligence solutions for the tourism industry New experiences in the stores of the future
  • Big Data
    • Business Messaging – From humble SMS to conversational commerce Understanding clients of La Vaguada shopping center
  • Cybersecurity
    • Cyberintelligence Report: Global Banking Cyber Report Will Rust save the world? (II)

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • The Attack on SolarWinds Reveals Two Nightmares: What Has Been Done Right and What Has Been Done Wrong
      Sergio de los Santos

      The Attack on SolarWinds Reveals Two Nightmares: What Has Been Done Right and What Has Been Done Wrong

      All cyber security professionals now know at least part of what was originally thought to be “just” an attack on SolarWinds, which has just truned out to be one...
      Fireless Malware
      Diego Samuel Espitia

      Fileless Malware: A Growing but Controllable Attack

      For some years now, WatchGuard has been generating a report on the security situation detected on the Internet. Following the acquisition of Panda, this report has become even more...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • New research: we discover how to avoid SmartScreen via COM Hijacking and with no privileges
      ElevenPaths

      New research: we discover how to avoid SmartScreen via COM Hijacking and with no privileges

      COM Hijacking technique has a simple theoretical basis, similar to the DLL Hijacking one: What does it happen when an application searches for a non-existent COM object on the...
      ElevenPaths

      Cybersecurity Weekly Briefing October 17-23

      New banking trojan called Vizom IBM Security Trusteer’s research team has published a report analysing the new “Brazilian family” banking Trojan called Vizom. This malicious software uses similar techniques to...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ElevenPaths

      How to forecast the future and reduce uncertainty thanks to Bayesian inference (II)

      In the first part of this article we explained how Bayesian inference works. According to Norman Fenton, author of Risk Assessment and Decision Analysis with Bayesian Networks: Bayes’ theorem is...
      ElevenPaths Radio English #4 - Privacy and Personal Data Protection
      ElevenPaths

      ElevenPaths Radio English #4 – Privacy and Personal Data Protection

      Privacy and personal data protection are two of the greatest concerns today due to the large amount of information leaking out to the media every day. Practically all big...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

46% Of the Main Spanish Websites Use Google Analytics Cookies Before the Consent Required by The Spanish Data Protection Agency (AEPD)
Innovation and Laboratory Area in ElevenPaths

46% Of the Main Spanish Websites Use Google Analytics Cookies Before the Consent Required by The Spanish Data Protection Agency (AEPD)

Over the past few months, many IT departments have been busy carrying out this task of adaptation in order to comply with the new regulations on cookies. Every time...
WhatsApp terms and conditions update - a cheeky move?
Carlos Ávila

WhatsApp Terms and Conditions Update: A Cheeky Move?

Surely by now many have already accepted the new terms and privacy policies without really knowing what they were about or their impact on the privacy of their data,...
Cyber Security Weekly Briefing January 2-8
ElevenPaths

Cyber Security Weekly Briefing January 2-8

SolarWinds Update To end the year, Microsoft published an update of its findings regarding the impact of the SolarWinds incident on its systems. In this release, it emphasizes that neither...
The First Official Vulnerabilities in Machine Learning in General
Franco Piergallini Guida

The First Official Vulnerabilities in Machine Learning in General

Today you are nobody on the market if you do not use a Machine Learning system. Whether it is a system of nested “ifs” or a model of real...
Cyber Security Weekly Briefing December 12-18
ElevenPaths

Cyber Security Weekly Briefing December 12-18

Supply Chain compromise: SolarWinds Orion FireEye researchers have unveiled a major global information theft and espionage operation that takes advantage of the supply chain to gain access to the systems...
Hiding Keys Under the Mat: Governments Could Ensure Universal Insecurity
Gonzalo Álvarez Marañón

Hiding Keys Under the Mat: Governments Could Ensure Universal Insecurity

The doorbell rang. “Who will be ringing now?” asked Brittney Mills, as she struggled to get off the couch. Her eight months of pregnancy were beginning to hinder her...
ElevenPaths Radio English #5 - The Path After a Security Audit
ElevenPaths

ElevenPaths Radio English #5 – The Path After a Security Audit

What is the path for a company after a security audit? It is increasingly common for companies of all sizes to decide to carry out such analyses, but what...
Cyber Security Weekly Briefing December 5-11
ElevenPaths

Cyber Security Weekly Briefing December 5-11

Microsoft Security Newsletter On December 8, Microsoft published its monthly security update newsletter, which this time includes patches for 58 vulnerabilities and an advisory for various Microsoft products. Nine of...
What Is Wrong with Quantum Cryptography That the World's Largest Intelligence Agencies Discourage Its Use
Gonzalo Álvarez Marañón

What Is Wrong with Quantum Cryptography That the World’s Largest Intelligence Agencies Discourage Its Use

Quantum cryptography does not exist. What everyone understands when the term “quantum cryptography” is mentioned is actually the quantum key distribution (QKD). And this is precisely what I want...
ElevenPaths

Cyber Security Weekly Briefing 28 November – 4 December

New version of the TrickBot malware TrickBot botnet operators have added a new capability that allows them to interact with the BIOS or UEFI firmware of an infected computer. This...

Navegación de entradas

Previous articles
1 … 21 22 23 … 64
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
ElevenPaths announced its new strategic alliances in the third Security Day
In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented. Madrid, 26th May....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration