Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Bed time will never be the same A world-champion IoT
  • Big Data
    • A history of Lisp and its use in neural networks – Part I How Drones are making use of Artificial Intelligence
  • Cybersecurity
    • Cyber Security Weekly Briefing, 3 – 9 December Cyber Security Weekly Briefing 5-11 March

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Telefónica Invests in Nozomi Networks, a Leading Company in OT and IoT Security
      ElevenPaths

      Telefónica Invests in Nozomi Networks, a Leading Company in OT and IoT Security

      The investment reinforces an earlier joint services agreement with Nozomi Networks and ElevenPaths, Telefónica Tech’s cybersecurity company
      Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates
      Gonzalo Álvarez Marañón

      Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates

      You may have noticed that most websites have a little padlock on them. If you click on it, a window will pop up stating that “the connection is secure”....
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      In search of improved cryptocurrency privacy with Dash, Zcash and Monero

      When we talk about cryptocurrencies we often find ourselves with the belief that their use is completely anonymous. However, those who have investigated a little about them (because it...
      New research: we discover how to avoid SmartScreen via COM Hijacking and with no privileges
      ElevenPaths

      New research: we discover how to avoid SmartScreen via COM Hijacking and with no privileges

      COM Hijacking technique has a simple theoretical basis, similar to the DLL Hijacking one: What does it happen when an application searches for a non-existent COM object on the...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Martiniano Mallavibarrena

      Attention: Data leak! (In search of lost data)

      We have been hearing about “data leaks” on a regular basis for years, both in the media and in our professional or even personal environment. The concept actually covers...
      ElevenPaths

      The Framing Effect: you make your choices depending on how information is presented

      You have received an alert from cyber intelligence. A terrible and enormous cyberattack is approaching. You must ensure the protection of 600 positions within your organization. You don’t have...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Vendetta Group and the COVID-19 Phishing Emails
Miguel Ángel de Castro

Vendetta Group and the COVID-19 Phishing Emails

A new threat has entered the COVID-19 scene: the Vendetta Group. How are their phishing campaigns different from others?
Cybersecurity Weekly Briefing 6-12 June
ElevenPaths

Cybersecurity Weekly Briefing 6-12 June

Enel and Honda Compromised by Snake Ransomware Italian energy corporation Enel and Japanese automotive giant Honda were hit last weekend by ransomware attacks that would have impacted on their IT...
Interpretation and Evolution of MITRE ATT&CK: More "Horizontal" Coverage Doesn't Mean Better Protection
Cytomic Team, unit of Panda Security

Interpretation and Evolution of MITRE ATT&CK: More “Horizontal” Coverage Doesn’t Mean Better Protection

The Cytomic team, a unit of Panda Security, explains what the MITRE ATT&CK matrix is based on in order to standardise the behaviour of opponents.
AMSIext: Our Extension That Detects Malware in the Browser Memory
Innovation and Laboratory Area in ElevenPaths

AMSIext: Our Extension That Detects Malware in the Browser Memory

Given the evolution in malware propagation techniques, we need mechanisms to detect threats as soon as possible such as AMSIext.
Cybersecurity Weekly Briefing 30 May-5 June
ElevenPaths

Cybersecurity Weekly Briefing 30 May-5 June

Security Breach in 8Belts vpnMentor researchers discovered in mid-April a data breach in the 8Belts language learning platform due to an improper configuration on an Amazon Web Services S3 bucket....
#CyberSecurityPulse: Non-Headlined Technical News with RSS and Website
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityPulse: Non-Headlined Technical News with RSS and Website

Find out all about #CyberSecurityPulse, our Telegram cybersecurity news channel.
The Security behind Apple's and Google's API for Tracing COVID-19 Infections
Gonzalo Álvarez Marañón

The Security behind Apple’s and Google’s API for Tracing COVID-19 Infections

How does Apple's and Google's technology developed for tracing Covid-19 infections work?
Winner of the #EquinoxRoom111 Contest
Innovation and Laboratory Area in ElevenPaths

Winner of the #EquinoxRoom111 Contest

We already have a winner of TheTHE's plugin contest. Discover our collaborative tool for Threat Hunting teams.
Developing a Tool to Decrypt VCryptor Ransomware
Innovation and Laboratory Area in ElevenPaths

Developing a Tool to Decrypt VCryptor Ransomware (Available on NoMoreRansom.org)

Discover how VCryptor ransomware works and the tool we have developed as part of NoMoreRansom.org to decrypt it.
Cybersecurity Weekly Briefing 23-29 May
ElevenPaths

Cybersecurity Weekly Briefing 23-29 May

Critical-Severity RCE Vulnerability in Cisco Unified CCX Cisco has fixed a critical remote code execution bug in the Java Remote Management Interface of Cisco Unified Contact Center Express (CCX). This...

Navegación de entradas

Previous articles
1 … 32 33 34 … 64
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
Eleven Paths Talks: WordPress in Paranoid Mode
  ¡Regístrate aquí!   El próximo Jueves 30 de Junio nuestro compañero Pablo González impartirá una charla en la que se verá una prueba de concepto realizada en Eleven Paths. Pablo está en...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration