Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Telefónica Tech At MWC: Economic and Social Recovery Are Our Priorities An IoT that deserves an Oscar
  • Big Data
    • Download your eBook, The Data Economy: Wealth 4.0 How AI and Machine Learning help to develop vaccines
  • Cybersecurity
    • New report: Malware attacks Chilean banks and bypasses SmartScreen, by exploiting DLL Hijacking within popular software 3 Key Cyber Security Considerations

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths

      Cyberintelligence Report: Global Banking Cyber Report

      As the world becomes more digital, new opportunities and threats arise and we tend to focus more on our daily business. As a result, when we are trying to...
      ElevenPaths

      Securing a Cloud Environment With a Telco Cloud Provider

      Nowadays, nobody can deny the remarkable benefits of cloud computing, both infrastructure as a service (IaaS) and software as a service (SaaS). Cloud computing drives cost savings, agility to...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Cybersecurity Weekly Briefing 29 August-4 September
      ElevenPaths

      Cybersecurity Weekly Briefing 29 August-4 September

      Red Dawn, new attached document from Emotet The use of a new attached document template by Emotet has been identified over the past week. The name given by security researcher Joseph...
      TheTHE: The Threat Hunting Environment
      Innovation and Laboratory Area in ElevenPaths

      TheTHE: The Threat Hunting Environment, our tool for researchers

      TheTHE, a unique tool within its category that allows analysts and hunters to carry out their research tasks in a more agile and practical way.
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
      Cristina del Carmen Arroyo Siruela

      The human factor: a key element of cyber security

      When it is said that a server needs to be bastioned, cybersecurity personnel have an idea of what it is and what it consists of. But what about securing...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

ElevenPaths

Cybersecurity Shot_MUPOL Information Leakage

Here comes Cybersecurity Shot, a research report on current cases related to databases leaked online that includes leakage prevention recommendations. Every week in May and June we will be publishing...
Florence Broderick

Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization

Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick

New Tool: PinPatrol add-on for Firefox

We have created a new tool for improving the experience using HSTS and HPKP in Firefox. This tool is a Firefox add-on that shows this information in a human...
Florence Broderick

New tool: Maltego transforms for Tacyt

If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick

European Cybersecurity Strategy: Telefónica´s support

Telefónica welcomes two relevant milestones that have taken place in Brussels during the last days in order to foster the European cybersecurity strategy to avoid incidents that can undermine...
Florence Broderick

Another month, another new rooting malware family for Android

Several months ago there was a media explosion about Android-rooting malware on Google Play. Those families were discovered by Cheetah Mobile Security Research Lab, Check Point, Lookout, FireEye,...
Florence Broderick

Eleven Paths Talks: WordPress in Paranoid Mode

  ¡Regístrate aquí!   El próximo Jueves 30 de Junio nuestro compañero Pablo González impartirá una charla en la que se verá una prueba de concepto realizada en Eleven Paths. Pablo está en...
Florence Broderick

ElevenPaths and Fortinet form an alliance to offer managed security services

Agreement Extends 15 Year Relationship to Deliver Seamless and Adaptive Security from IoT to Cloud Networks SUNNYVALE, Calif., June 15, 2016. – Telefonica (NYSE: VIV), one of the world’s leading...
Florence Broderick

Cybersecurity Shot_Myspace Information Leakage

Here comes Cybersecurity Shot, a research report on current cases related to databases leaked online that includes leakage prevention recommendations. Every week in May and June we will be publishing...
Florence Broderick

Data Loss Detection: El caso de Panamá Paper y cómo proteger tus propios “papeles”

En todas las organizaciones manejamos documentos que si llegaran a estar disponibles públicamente dañarían a nuestro negocio: datos de carácter personal, listas de clientes o proveedores, información de nuevos...

Navegación de entradas

Previous articles
1 … 51 52 53 … 64
More articles
  • Telefónica Tech

Popular

Florence Broderick
ElevenPaths announced its new strategic alliances in the third Security Day
In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented. Madrid, 26th May....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to use Metashield protector for Client and why using it
Metashield is an Eleven Paths product that allows to clean up metadata from most of office documents. It tries to cover a gap where there seems not to exist any...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration