Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • We apply quantum technology to real use cases of Blockchain and IoT Architecture, digitalisation, and sustainability as pillars of the transformation of football stadiums
  • Big Data
    • The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part II) Case Study: LUCA Store and DK Management, driving footfall and increasing convertion
  • Cybersecurity
    • Cyber Security Weekly Briefing March 6-12 Disinformation and fake news: what initiatives do exist to combat them?

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Fireless Malware
      Diego Samuel Espitia

      Fileless Malware: A Growing but Controllable Attack

      For some years now, WatchGuard has been generating a report on the security situation detected on the Internet. Following the acquisition of Panda, this report has become even more...
      Move to the cloud with confidence supported by ElevenPaths and Check Point
      Pablo Alarcón Padellano

      Move to the cloud with confidence supported by ElevenPaths and Check Point

      The goal of ElevenPaths Public Cloud Managed Security Services is to help you to secure any cloud workload and to mitigate cloud risks.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Cómo realizar peticiones API REST a los servicios ocultos de Tor desde un APK de Android
      Rafael Ortiz

      How to Make API REST Requests to Tor Hidden Services in an Android APK

      If you are a developer and want to test your Android app with a Tor hidden service, here's how.
      New TheTHE Version with URLScan and MalwareBazaar Plugins
      Innovation and Laboratory Area in ElevenPaths

      New TheTHE Version with URLScan and MalwareBazaar Plugins

      The first time an IoC lay on your hands. Let’s say it is a hash, URL, IP or a suspicious domain. You need to know some basic information. Is...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Cyber Security Weekly Briefing 14-27 August
      Telefónica Tech

      Cyber Security Weekly Briefing 14-27 August

      Exploitation of vulnerabilities in Exchange ProxyShell​ Security researcher Kevin Beaumont has analyzed the recent massive exploitation of Microsoft Exchange Server vulnerabilities known as ProxyShell. These are a set of flaws revealed by Orange...
      Cyber Security Weekly Briefing 22-28 january
      Telefónica Tech

      Cyber Security Weekly Briefing 22-28 January

      New vulnerabilities in Linux Two new vulnerabilities of risk have recently been disclosed and are reportedly affecting Linux systems. If exploited, they could allow privilege escalation on the vulnerable system. CVE-2021-4034...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Florence Broderick

The Android Trojan preinstalled in Amazon Tablets is in Google Play as well

Researchers from Cheetah Mobile have found Trojans preinstalled in some cheap Amazon tablets, very hard to remove. But, here in ElevenPaths we have found that a version of this...
Florence Broderick

Apps in Google Play that install an HTTP Server as a backdoor in your Android

Trend Micro has discovered a very interesting problem with an SDK called Moplus that, literally, works as a backdoor for Android devices. The problems here are that this SDK...
Florence Broderick

Android malware not only posing as Word documents… but Excel as well

China is a paradise for “SMS stealing malware” for Android. These programs steal your SMS inbox, notebook… The only “problem” for malware creators is to induce users to...
Florence Broderick

New Financial Cyber Threats Report

New “Financial Cyber Threats (Q3 2015)” report Summary This report analyzes the current trends related to financial phishing and banking malware, including attacks on mobile devices, POS (Point of Sales) systems...
Florence Broderick

About the relations between ngemobi/Xinynhe, Ghost Push, Kemoge and Odpa malicious Android adware

Over the last few weeks we have seen some blog entries about different new Android based mobile malicious adware families discovered or spotted by CM Security Research Lab, Checkpoint,...
Florence Broderick

New "Insecurity in the Internet of Things" report

New Insecurity in the IoT reportYou can now download the full report about Insecurity in the Internet of Things carried out by ElevenPaths’ Analyst Team. It`s available at ElevenPaths web. SummaryIn...
Florence Broderick

Telefónica and ElevenPaths announce new market leading security offering following key sector agreements

Florence Broderick

How Telefónica collaborates with the GSMA to define a project use case scenarios using lean startup”?

The entrepreneurs of startups were the first ones to adopt the Lean Startup method when Eric Ries published in 2011 his book The Lean Startup. Big companies like Telefónica...
Florence Broderick

Evil FOCA is now Open Source

We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick

Who are you going to believe, me or your own eyes? The dilemma of managed security

Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...

Navegación de entradas

Previous articles
1 … 55 56 57 … 64
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
ElevenPaths announced its new strategic alliances in the third Security Day
In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented. Madrid, 26th May....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration