Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Sweet dreams with IoT Smart Stadiums: How 5G is revolutionising live Sports
  • Big Data
    • Join us for the first Big Data for Social Good in Action event How to fund your data journey
  • Cybersecurity
    • CryptoClipWatcher, our new tool against crypto clipboard hijacking techniques Cyber Security Weekly Briefing, 21 – 27 January

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths

      #CyberSecurityPulse: The eternal dispute: backdoors and national security

      A bipartisan group of legislators from the house of representatives has introduced a piece of legistation which will prevent the federal government of the United States from demanding companies...
      NextDefense: The ultimate cyber defence solution for any organisation
      Nikolaos Tsouroulas

      NextDefense: The ultimate cyber defence solution for any organisation

      It was on a Wednesday at 17:00h when the CIO of a potential customer, who was visiting our offices, asked for a meeting with the product team before leaving....
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • David García

      What’s new in the OWASP 2021 ranking?

      OWASP, the foundation focused on web application security, has recently updated its ranking of the most prominent risks. Let’s take a look at the new reorganisation of the top,...
      The hugest collection of usernames and passwords has been filtered…or not
      ElevenPaths

      The hugest collection of usernames and passwords has been filtered…or not (I)

      Sometimes, someone frees by mistake (or not) an enormous set of text files with millions of passwords inside. An almost endless list of e-mail accounts with their passwords or...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • University and Industry: Talent Is Out There (III)
      Innovation and Laboratory Area in ElevenPaths

      University and Industry: Talent Is Out There (III)

      Discover the two projects of the 3rd edition of the Master's Degree in Cybersecurity from the UCAM in collaboration with Telefónica.
      D3FEND
      David García

      D3FEND, the other side of the ATT&CK coin

      We are already familiar with the ATT&CK project of the MITRE corporation. It is a de facto standard that helps us to characterise threats based on the techniques and...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Florence Broderick

ElevenPaths uncover several malicious apps on Google Play

ElevenPaths published recently an investigation revealing how malicious apps are opperating in Google PLay, by subscribing users under special tariff numbers. They analysed which type of app is mostly...
Florence Broderick

ElevenPaths and Consultores de Firma Avanzada together to protect Digital Banking, Insurance and Utility sectors

The scientific advances in facial and voice recognition, or biometric recognition for signatures are already a reality. In this context, we announce our most recent technological partnership with Consultores...
Florence Broderick

Latch Plugins Contest 2016: Videos and Documentation

You can find here the compilation of plugins submitted to the Latch Plugins Contest 2016. Congratulations to all participants for the work done and the results! Plugin Name: Latch OpenWRT. Author:...
Florence Broderick

ElevenPaths and Enigmasec associated to help small and medium organizations in face of the invasion of systems

The last week, we announced a partnership with Enigmasec, a company specialized in incident responses for cybersecurity, with the goal of improving its capabilities in cyber attacks that breaks...
Florence Broderick

ElevenPaths and Cyber Threat Alliance (CTA) collaborates in sharing information intelligence about cyber threats

In 2015, ElevenPaths, together with another market leader companies, such as Check Point, Cisco, Fortinet, Intel Security, Palo Alto and Symantec, brought together their strength to join a community...
Florence Broderick

ElevenPaths joins Saint Patrick Technology to offer security solutions based on the latest Big Data technologies

We announce today our most recent partnership with Saint Patrick Technology, the leading company in the development of solutions based on the latest technologies, such as AR, VR, NFC,...
Florence Broderick

Latch Plugins Contest 2016: we finally have winners!

We can now announce the winners of our “Latch Plugins Contest 2016“, showing the creativity, ideas and imagination of the participants in the submitted proposals. This edition of the...
Florence Broderick

Jam Session with Greg Day Madrid 2017 Roundup

Estrenamos el mes de febrero uniéndonos a nuestros colegas de Palo Alto para celebrar nuestra primera Jam Session del año en Madrid. Este año iniciamos nuestras sesiones de visión...
Florence Broderick

New Report: Most common errors when implementing HPKP, HSTS and preload conditions

We have collected and visited two different sources of domains and webpages, Alexa top million domains, and Shodan. These results come from November 2016 searches. From those domains, we...
Florence Broderick

See You at the RSA Conference 2017

The U.S. city of San Francisco is to host once again, as it does every year, one of the most important events worldwide in the field of security, RSA...

Navegación de entradas

Previous articles
1 … 48 49 50 … 64
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
Latch USB Monitor: New tool to monitor PNP devices with Latch
Latch USB Monitor is a tool that monitors Plug ‘n Play device (PNP) changes in Windows and gives the user the possibility of tracking incoming devices, and react accordingly...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration