Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Now the lighting is also smart Women’s Engineering Day: Building New Paths
  • Big Data
    • Alastria 3.0: the spanish blockchain consortium Open Data and API’s in Video Games: League of Legends puts them to practice
  • Cybersecurity
    • #CyberSecurityPulse: The Transparent Resolution of Vulnerabilities Is Everyone’s Business Dumpster diving in Bin Laden’s computers: malware, passwords, warez and metadata (I)

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths

      Security and electronic signature for any enterprise

      ElevenPaths, Microsoft and Gradiant have collaborated to allow companies to benefit from an advanced platform for electronic signatures and digital certificate safekeeping, integrated with a cloud service for HSM...
      DIARIO: Our Privacy-Friendly Document Malware Detector
      Innovation and Laboratory Area in ElevenPaths

      DIARIO: Our Privacy-Friendly Document Malware Detector

      DIARIO makes possible to scan and analyse documents for malware detection with no need to know the content of those files.. Find out more in this post.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Cyber Security Weekly Briefing January 9-15
      ElevenPaths

      Cyber Security Weekly Briefing January 9-15

      Sunburst shows code matches with Russian-associated malware Researchers have found that the Sunburst malware used during the SolarWinds supply chain attack is consistent in its characteristics with Kazuar, a .NET...
      Cybersecurity Weekly Briefing July 25-31
      ElevenPaths

      Cybersecurity Weekly Briefing July 25-31

      BootHole: Vulnerability in GRUB2 Eclypsium researchers have discovered a buffer overflow vulnerability in the GRUB2 bootloader that could be used to execute arbitrary code during the boot process. It has...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ¿Ransomware in Pandemic or Ransomware Pandemic?
      Gabriel Bergel

      ¿Ransomware in Pandemic or Ransomware Pandemic?

      No one imagined what could happen in the field of cyber security during the Covid-19 pandemic. Perhaps some colleagues were visionary, or others were basically guided by the statistics...
      Cyber Security Weekly Briefing august
      Telefónica Tech

      Cyber Security Weekly Briefing, 30 July – 5 August

      Possible link between Raspberry Robin malware and Evil Corp infections The Microsoft Threat Intelligence Center (MSTIC) team has published new information about the Raspberry Robin malware, first detected by the...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Telefónica Tech

Cyber Security Weekly Briefing, 21-28 October

Campaigns spreading ERMAC malware  A team of Cyble researchers recently discovered a mass phishing campaign aimed at spreading the ERMAC banking trojan. The infection method is based on downloading fake...
Photo: Benjamin Child / Unsplash
Estevenson Solano

What is the Fifth Domain and what is its strategic importance?

In recent years, conflict and stability in cyberspace have become a growing concern for many countries and organisations that consider cyberspace as a strategic domain and have strengthened their...
Telefónica Tech

Cyber Security Weekly Briefing, 15-21 October

The Noname057(16) group attacks the Spanish Ministry of Defense Last Friday, threat actor Noname057(016) carried out an attack against the website of the Spanish Ministry of Defense, rendering them unavailable...
Juan Carlos Vigo López

Secure Digital Workplace: chronicle of a foretold (and necessary) evolution

The changes that have taken place in the Digital Workplace lately have put some technological areas under stress, as we have had to adapt to the evolutions during and...
Photo: Gorodenkoff/Shutterstock
Telefónica Tech

Selecting a managed security service provider (MSSP): 5 key factors to keep in mind

An Managed Security Service Provider (MSSP) offers you a team of seasoned security experts that will work for you at a fraction of the cost of building your security...
Phoro: Priscilla du Preez / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 7 — 14 October

Critical vulnerability in Fortinet  Fortinet has issued a security advisory to its customers urging them to update their FortiGate firewalls and FortiProxy web proxy, in order to fix a critical authentication bypass...
Photo: Adem Ay / Unsplash
Diego Samuel Espitia

How to protect your social media accounts

Companies and individuals use social networks today to generate new revenue or to sell their services and products, much more than just to communicate with other people or to...
Photo: Markus Winkler / Unsplash
Roberto García Esteban

6 common mistakes when quoting for a Cloud project

There is no doubt that Cloud Computing technology brings with it enormous opportunities for companies, but its financial particularities need to be well understood. Traditionally, the IT model was about...
Telefónica Tech

Cyber Security Weekly Briefing, 1 — 7 October

Lazarus targets Dell via new FudModule rootkit  ESET researchers have reported a new Lazarus campaign targeting a Dell hardware driver using a new rootkit called FudModule. The rootkit uses a...
Photo: National Cancer Institute / Unsplash
Roberto García Esteban

Cloud Computing is the future of the healthcare sector

Healthcare is a sector that is continuously generating a large amount of data. To put it in numbers, every year our National Health System manages 234 million medical consultations...

Navegación de entradas

Previous articles
1 … 9 10 11 … 64
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration