Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • AI of Things(I): Multiplying the value of connected things IoT Activation: the IoT Program for Startups
  • Big Data
    • Our “telco” take on Uber Movement Big Data and Tourism: How this Girona Festival became Data-Driven
  • Cybersecurity
    • Cyber Security Weekly Briefing, 3 – 9 December ElevenPaths Approaches the Cyber Security Paradigm Shift and the New Era’ s Digital Transformation in the SID 2020
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cybersecurity

ElevenPaths

#CyberSecurityPulse: New proposal to adapt U.S. Marine Corps capabilities to the new times

The head of the U.S. Marine Corps wants to remodel his team. The Marine Corps is considering offering bonuses and other benefits to attract older, more experienced Marines to...
ElevenPaths

ElevenPaths Announces Strategic Security Alliance with Devo

Provides Telefónica Customers Advanced Cybersecurity Monitoring and Protection Services Through Devo Data Operations Platform. Madrid- Thursday 14th of June, 2018. ElevenPaths, the Telefónica Cybersecurity Unit, specialized in development of innovative...
ElevenPaths

#CyberSecurityPulse: Changing stereotypes in the security sector

Ripples of outrage spread across the cybersecurity industry last week after women in red evening gowns were seen promoting a product at the Infosecurity Europe 2018 conference. The event’s...
ElevenPaths

New tools: Metashield Bots, analyzing and cleaning metadata for everyone, from everywhere

You all know Metashield. Basically, it is a technology from our own to analyze and clean metadata, that is used in several of our own products. Although metadata seems...
ElevenPaths

ElevenPaths further strengthens its reputation as a cybersecurity services provider

Today was the fifth edition of the Security Day event, organized by ElevenPaths, the Telefónica Cybersecurity Unit, which took place in Madrid, under the slogan “Cybersecurity On Board“. This...
ElevenPaths

#CyberSecurityPulse: Google’s project to fight election attacks

On the night of the primary elections in May, the residents from the county Knox, Tennessee, did not know who had won for about an hour. They did not...
ElevenPaths

Expanding Neto capabilities: how to develop new analysis plugins

In previous posts we have introduced Neto as a browser extension analyzer. The first version we released, 0.5.x included a CLI, a JSON-RPC interface and could be used directly...
ElevenPaths

Analyzing browser extensions with Neto Console

Fifteen days ago we published the first version of Neto, our extensions analyzer in Github. It was published under a free license, also during this time we have worked...
ElevenPaths

#CyberSecurityPulse: The eternal dispute: backdoors and national security

A bipartisan group of legislators from the house of representatives has introduced a piece of legistation which will prevent the federal government of the United States from demanding companies...
ElevenPaths

Technically analysing a SIEM… are your logs secure?

The SIEMs are usually utilized within highly secure of regulated environments, where regular log monitoring and analysis is required to search for security incidents. They help to make...

Navegación de entradas

Previous articles
1 … 49 50 51 … 55
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration