Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • IoT and everything under control The era of a connected society
  • Big Data
    • International call traffic may tell you more than first thought The Data Transparency Lab Conference 2016 kicks off tomorrow
  • Cybersecurity
    • 26 Reasons Why Chrome Does Not Trust the Spanish CA Camerfirma Windows 11 security improves and joins Zero Trust

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Photo: Christina Wocintechchat.com / Unsplash
      Telefónica Tech

      Cyber Security Weekly Briefing, 9 — 15 July

      Rozena: backdoor distributed by exploiting Follina vulnerability Fortinet researchers have published an analysis of a malicious campaign in which they have detected the distribution of a new backdoor exploiting the...
      How to Trick Apps That Use Deep Learning for Melanoma Detection
      Franco Piergallini Guida

      How to Trick Apps That Use Deep Learning for Melanoma Detection

      One of the great achievements of deep learning is image classification using convolutional neural networks. In the article “The Internet of Health” we find a clear example where this...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Detecting the Indicators of An Attack
      Diego Samuel Espitia

      Detecting the Indicators of An Attack

      We always choose to implement prevention and deterrence rather than containment mechanisms in security. However, the implementation of these mechanisms is not always effective or simple to set up...
      Cyber Security Weekly Briefing January 2-8
      ElevenPaths

      Cyber Security Weekly Briefing January 2-8

      SolarWinds Update To end the year, Microsoft published an update of its findings regarding the impact of the SolarWinds incident on its systems. In this release, it emphasizes that neither...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • What differential privacy is and why Google and Apple are using it with your data
      Gonzalo Álvarez Marañón

      What Differential Privacy Is and Why Google and Apple Are Using It with Your Data

      Differential privacy allows you to know your users without compromising their privacy, but achieving it is a complex process. Here's why.
      Cyber Security Weekly Briefing February 6-12
      ElevenPaths

      Cyber Security Weekly Briefing February 6-12

      Attempted contamination of drinking water through a cyber-attack An unidentified threat actor reportedly accessed computer systems at the City of Oldsmar’s water treatment plant in Florida, US, and altered the...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Innovation and Laboratory Area in ElevenPaths

ClipBanker Malware Tries to Stop Our Defence Tool CryptoClipWatcher

The malware capable of modifying the clipboard to “switch” the crypto wallet still exists. To fight it, ElevenPaths developed CryptoClipWatcher, a tool that monitors the clipboard and alerts if...
Cybersecurity and Pandemic (I): People
Gabriel Bergel

Cybersecurity and Pandemic (I): People

Cybersecurity is even more important in these times of pandemic and increasing cyberattacks, yes, but in addition to being a business focus at the corporate level, it must also...
Cybersecurity Weekly Briefing July 25-31
ElevenPaths

Cybersecurity Weekly Briefing July 25-31

BootHole: Vulnerability in GRUB2 Eclypsium researchers have discovered a buffer overflow vulnerability in the GRUB2 bootloader that could be used to execute arbitrary code during the boot process. It has...
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityReport20H1: Microsoft Fixes Many More Vulnerabilities, but Detects Far Fewer

Understand the risks of the current cybersecurity scene with this biannual report by our Innovation and Laboratory Area.
Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?
Sergio de los Santos

Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?

Conti, the fastest ransomware, is just one example of how this threat is evolving. Discover what tricks it uses and why in this article.
4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools
Innovation and Laboratory Area in ElevenPaths

4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools

Discover the tools we contribute to this important initiative launched by Europol to help ransomware victims.
Cybersecurity Weekly Briefing July 18-24
ElevenPaths

Cybersecurity Weekly Briefing July 18-24

New Emotet Campaign after 5 Months of Inactivity After several months of inactivity, Emotet is back with a massive sending of reply-chain and payment emails, among others, that include malicious...
University and Industry: Talent Is Out There (III)
Innovation and Laboratory Area in ElevenPaths

University and Industry: Talent Is Out There (III)

Discover the two projects of the 3rd edition of the Master's Degree in Cybersecurity from the UCAM in collaboration with Telefónica.
Security and Privacy on the "Internet of Health”
Carlos Ávila

Security and Privacy on the “Internet of Health”

Health comes first, but first we must ensure that our medical data have the appropriate security mechanisms to be reliable.
Challenges and Business Opportunities of Post Quantum Cryptography
Gonzalo Álvarez Marañón

Challenges and Business Opportunities of Post Quantum Cryptography

Sooner or later we'll have to make the leap to post-quantum cryptography. Discover this new system and prepare your organization for change.

Navegación de entradas

Previous articles
1 … 29 30 31 … 64
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
Eleven Paths Talks: WordPress in Paranoid Mode
  ¡Regístrate aquí!   El próximo Jueves 30 de Junio nuestro compañero Pablo González impartirá una charla en la que se verá una prueba de concepto realizada en Eleven Paths. Pablo está en...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration