Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The Future of Connected Vehicles and IoT Key ingredients for today’s Smart Cities
  • Big Data
    • Python for all (3): ScyPy, NumPy, Pandas…. What libraries do we need? Are data-driven strategies in the energy sector competitive? Naturgy proves it.
  • Cybersecurity
    • Women’s Engineering Day: Building New Paths Plausibly Deniable Encryption or How to Reveal A Key Without Revealing It

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cyber Security Weekly Briefing April 10-16
      ElevenPaths

      Cyber Security Weekly Briefing April 10-16

      ​0-days in Chrome and Edge Security researcher Rajvardhan Agarwal has discovered a 0-day vulnerability in the current versions of Google Chrome and Microsoft Edge, which he has made public via his...
      Cybersecurity for industrial digitalisation: keys to a successful approach
      ElevenPaths

      Cybersecurity for Industrial Digitalisation: Keys to a Successful Approach

      Digital technologies, and in particular what has been agreed to be called IoT (Internet of Things), bring a world of possibilities that organisations of any sector cannot fail to...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      #CyberSecurityPulse: Google’s project to fight election attacks

      On the night of the primary elections in May, the residents from the county Knox, Tennessee, did not know who had won for about an hour. They did not...
      Telefónica Tech

      Cyber Security Weekly Briefing 28-31 december

      Smishing campaign impersonating MRW and Sending using real order data Numerous Twitter users are reporting a smishing campaign in which the logistics companies Sending and MRW are being impersonated. The...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Snitch Cryptography: How to Crack Tamper-Proof Devices
      Gonzalo Álvarez Marañón

      Snitch Cryptography: How to Crack Tamper-Proof Devices

      Google’s Titan Security Key or YubiKey from Yubico are the ultimate trend in multi-factor authentication security. According to Google’s own website: «The keys have a hardware chip with firmware designed...
      Sergio de los Santos

      Facebook signed one of its apps with a private key shared with other Google Play apps since 2015

      Facebook Basics is a Facebook app aimed at countries with poor connectivity, where a free access service to WhatsApp and Facebook is provided. It has been discovered that the Android version...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Vendetta Group and the COVID-19 Phishing Emails
Miguel Ángel de Castro

Vendetta Group and the COVID-19 Phishing Emails

A new threat has entered the COVID-19 scene: the Vendetta Group. How are their phishing campaigns different from others?
Cybersecurity Weekly Briefing 6-12 June
ElevenPaths

Cybersecurity Weekly Briefing 6-12 June

Enel and Honda Compromised by Snake Ransomware Italian energy corporation Enel and Japanese automotive giant Honda were hit last weekend by ransomware attacks that would have impacted on their IT...
Interpretation and Evolution of MITRE ATT&CK: More "Horizontal" Coverage Doesn't Mean Better Protection
Cytomic Team, unit of Panda Security

Interpretation and Evolution of MITRE ATT&CK: More “Horizontal” Coverage Doesn’t Mean Better Protection

The Cytomic team, a unit of Panda Security, explains what the MITRE ATT&CK matrix is based on in order to standardise the behaviour of opponents.
AMSIext: Our Extension That Detects Malware in the Browser Memory
Innovation and Laboratory Area in ElevenPaths

AMSIext: Our Extension That Detects Malware in the Browser Memory

Given the evolution in malware propagation techniques, we need mechanisms to detect threats as soon as possible such as AMSIext.
Cybersecurity Weekly Briefing 30 May-5 June
ElevenPaths

Cybersecurity Weekly Briefing 30 May-5 June

Security Breach in 8Belts vpnMentor researchers discovered in mid-April a data breach in the 8Belts language learning platform due to an improper configuration on an Amazon Web Services S3 bucket....
#CyberSecurityPulse: Non-Headlined Technical News with RSS and Website
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityPulse: Non-Headlined Technical News with RSS and Website

Find out all about #CyberSecurityPulse, our Telegram cybersecurity news channel.
The Security behind Apple's and Google's API for Tracing COVID-19 Infections
Gonzalo Álvarez Marañón

The Security behind Apple’s and Google’s API for Tracing COVID-19 Infections

How does Apple's and Google's technology developed for tracing Covid-19 infections work?
Winner of the #EquinoxRoom111 Contest
Innovation and Laboratory Area in ElevenPaths

Winner of the #EquinoxRoom111 Contest

We already have a winner of TheTHE's plugin contest. Discover our collaborative tool for Threat Hunting teams.
Developing a Tool to Decrypt VCryptor Ransomware
Innovation and Laboratory Area in ElevenPaths

Developing a Tool to Decrypt VCryptor Ransomware (Available on NoMoreRansom.org)

Discover how VCryptor ransomware works and the tool we have developed as part of NoMoreRansom.org to decrypt it.
Cybersecurity Weekly Briefing 23-29 May
ElevenPaths

Cybersecurity Weekly Briefing 23-29 May

Critical-Severity RCE Vulnerability in Cisco Unified CCX Cisco has fixed a critical remote code execution bug in the Java Remote Management Interface of Cisco Unified Contact Center Express (CCX). This...

Navegación de entradas

Previous articles
1 … 32 33 34 … 64
More articles
  • Telefónica Tech

Popular

Florence Broderick
ElevenPaths announced its new strategic alliances in the third Security Day
In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented. Madrid, 26th May....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to use Metashield protector for Client and why using it
Metashield is an Eleven Paths product that allows to clean up metadata from most of office documents. It tries to cover a gap where there seems not to exist any...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration