Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • MWC 2018: How Telefónica will create a better future with IoT The 10 best blogposts of 2017
  • Big Data
    • What does it take to become a top class Smart City? The future of OpenAI and the alternatives to its end as a non-profit business
  • Cybersecurity
    • Your MacOS System Is Also A Target for Cybercrime – Protect It! What Is Wrong with Quantum Cryptography That the World’s Largest Intelligence Agencies Discourage Its Use

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Trend Report: Hacktivist CyberThreats Report 2019
      ElevenPaths

      Trend Report: Hacktivist CyberThreats Report 2019

      An analytical report that includes the periodic scanning of the hacktivist threat’s behavior in five observation rings: Europe and the United Kingdom, North America, Latin America, MENA / Asia...
      ElevenPaths

      #CyberSecurityPulse: Guess Riddle… How Is Information Stored In a Bitcoin Address?

      As we have seen in previous post on ElevenPaths blog, the OP_RETURN field of a Bitcoin transaction is used to store a small portion of information (up to 80...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Telefónica Tech

      Cyber Security Weekly Briefing, 21 – 27 January

      Killnet targeting victims in Spain This week, the hacktivist group Killnet announced a campaign of attacks against Germany, leading to Distributed Denial of Service (DDoS) attacks that rendered the websites...
      Cybersecurity Weekly Briefing September 12-18
      ElevenPaths

      Cybersecurity Weekly Briefing September 12-18

      PoC for Critical Vulnerability on Netlogon Secura researchers have published a tool to check whether a domain controller is vulnerable to the CVE-2020-1472 vulnerability on Netlogon. Last month, Microsoft patched...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ¿Ransomware in Pandemic or Ransomware Pandemic?
      Gabriel Bergel

      ¿Ransomware in Pandemic or Ransomware Pandemic?

      No one imagined what could happen in the field of cyber security during the Covid-19 pandemic. Perhaps some colleagues were visionary, or others were basically guided by the statistics...
      Cyber Security Weekly Briefing 22-28 january
      Telefónica Tech

      Cyber Security Weekly Briefing 22-28 January

      New vulnerabilities in Linux Two new vulnerabilities of risk have recently been disclosed and are reportedly affecting Linux systems. If exploited, they could allow privilege escalation on the vulnerable system. CVE-2021-4034...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Cybersecurity Weekly Briefing September 12-18
ElevenPaths

Cybersecurity Weekly Briefing September 12-18

PoC for Critical Vulnerability on Netlogon Secura researchers have published a tool to check whether a domain controller is vulnerable to the CVE-2020-1472 vulnerability on Netlogon. Last month, Microsoft patched...
FaceApp and Personal Data, Hadn´t We Talked About This Already?
Christian F. Espinosa Velarde

FaceApp and Personal Data, Hadn´t We Talked About This Already?

Hadn’t we already talked about this? The comeback of applications like FaceApp and the fuss caused by the photos generated, in which their users can appear as women being...
ElevenPaths Radio English #3 - Why is Cybersecurity So Necessary Today?
ElevenPaths

ElevenPaths Radio English #3 – Why is Cybersecurity So Necessary Today?

In this episode, Gabriel Bergel, our CSA in Chile, explains that nowadays there is no excuse for not being interested in cybersecurity. At a personal level, the use of...
Analysis of APPs Related to COVID19 Using Tacyt (I)
Andrés Naranjo

Analysis of APPs Related to COVID19 Using Tacyt (I)

Taking advantage of all the attention this issue is attracting, the official app markets, Google Play and Apple Store, have been daily deluged with applications. Both platforms, especially Android,...
What Do Criminals in the Ransomware Industry Recommend so that Ransomware Does Not Affect You?
Sergio de los Santos

What Do Criminals in the Ransomware Industry Recommend so that Ransomware Does Not Affect You?

We all know the security recommendations offered by professionals on malware protection. Frequently: use common sense (personally, one of the least applicable and abstract pieces of advice that can...
Cybersecurity Weekly Briefing September 5-11
ElevenPaths

Cybersecurity Weekly Briefing September 5-11

Microsoft Patch Tuesday Microsoft published on Tuesday its newsletter with updates for the month of September. In this new bulletin a total of 129 vulnerabilities have been corrected in 15...
Cybersecurity and Pandemic (II)
Gabriel Bergel

Cybersecurity and Pandemic (II)

We continue with the second part of this article in which we analyse the current situation in its three dimensions. Let’s remember that in the first part of the...
Indicators of Compromise, Key to Detecting and Solving Incidents in an Agile Way
Cytomic Team, unit of Panda Security

Indicators of Compromise, Key to Detecting and Solving Incidents in an Agile Way

Quick and agile response to incidents is a basic aspect of a good cybersecurity strategy. Little by little, more and more companies are becoming aware of this, and this...
Our Story with Govertis
Carmen Dufur

Our Story With Govertis

Since José Mª Álvarez-Pallete announced the creation of Telefónica Tech last November, ElevenPaths has accelerated its pace to get the complicated yet exciting mission that was entrusted to us...
How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy
Gonzalo Álvarez Marañón

How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy

When you sign up for a new social network, such as WhatsApp, you are often asked if you want to find out who among your contacts is already part...

Navegación de entradas

Previous articles
1 … 27 28 29 … 64
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration