Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • A world-champion IoT How can we make water consumption more efficient?
  • Big Data
    • Can Big Data help reduce Deforestation in the Amazon? Movistar+ launches a pioneering advertising innovation project in Spain
  • Cybersecurity
    • We have a brand-new website! Get to know the new Telefónica Tech Cyber Security & Cloud website IoT Device Search Engines: Why Choose if We Can Use All of Them?

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths

      Cyberintelligence Report: Global Banking Cyber Report

      As the world becomes more digital, new opportunities and threats arise and we tend to focus more on our daily business. As a result, when we are trying to...
      Cyber Security Weekly Briefing November 7-13
      ElevenPaths

      Cybersecurity Weekly Briefing November 7-13

      Links between Vatet, PyXie and Defray777 Researchers from Palo Alto Networks have investigated the families of malware and operational methodologies used by a threat agent that has managed to go...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • 4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools
      Innovation and Laboratory Area in ElevenPaths

      4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools

      Discover the tools we contribute to this important initiative launched by Europol to help ransomware victims.
      Telefónica Tech

      Cyber Security Weekly Briefing, 21 – 27 January

      Killnet targeting victims in Spain This week, the hacktivist group Killnet announced a campaign of attacks against Germany, leading to Distributed Denial of Service (DDoS) attacks that rendered the websites...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • #LadyHacker blog
      ElevenPaths

      When I grow up I want to be… Engineer

      “What do you want to be when you grow up? A classic. So simple, yet so complex, and curiously so often asked when we are just kids… when perhaps...
      Telefónica Tech

      Cyber Security Weekly Briefing, 29 April – 5 May

      Critical vulnerability in Zyxel firewalls Network equipment manufacturer Zyxel has released security patches for a critical vulnerability affecting its firewalls. The vulnerability, which was discovered and reported by the TRAPA...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización cabecera: ElevenPaths

Homeworking and Pandemics: a Practical Analysis on BlueKeep Vulnerability in Spain and Latin America
Andrés Naranjo

Homeworking and Pandemics: a Practical Analysis on BlueKeep Vulnerability in Spain and Latin America

“It is not the strongest of the species that survives, not the most intelligent that survives. It is the one that is the most adaptable to change”.Charles Darwin One of...
ZoomEye: Extending TheTHE With More Plugins
Carlos Ávila

ZoomEye: Extending TheTHE With More Plugins

Those who follow the developments carried out by the Innovation and Laboratory team will be familiar with our theTHE platform, which specialises in Threat Hunting, IoC analysis and is...
Cybersecurity Weekly Briefing October 24-30
ElevenPaths

Cybersecurity Weekly Briefing October 24-30

Critical vulnerability in Hewlett Packard Enterprise SSMC Hewlett Packard Enterprise has fixed a critical authentication evasion vulnerability (CVE-2020-7197, CVSS 10) affecting its StoreServ Management Console (SSMC) storage management software. HPE...
Telefónica, Gradiant and Incibe Improve Companies’ Cyber Security
ElevenPaths

Telefónica, Gradiant and Incibe Improve Companies’ Cyber Security

The agreement boosts knowledge transfer to the private sectorTEGRA continues on the path to consolidate Galicia’s position as a major player in the European field of cyber security Telefónica, Gradiant...
Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?
Gonzalo Álvarez Marañón

Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?

A business is considered agile if it is able to respond quickly to market changes, adapt to maintain stability. However, without cryptography there is no security and without security...
Approaching Cybersecurity in Industry 4.0: The Age of Connected Machines
Gabriel Álvarez Corrada

Approaching Cybersecurity in Industry 4.0: The Age of Connected Machines

Don’t run away yet! This era is not about machines enslaving humanity (at least, not yet…) but about the introduction of elements (IOT devices, cloud environments, IA, Big Data, SIEM,...
ElevenPaths

Cybersecurity Weekly Briefing October 17-23

New banking trojan called Vizom IBM Security Trusteer’s research team has published a report analysing the new “Brazilian family” banking Trojan called Vizom. This malicious software uses similar techniques to...
ElevenPaths

Innovation and New Cybersecurity Tools: Security Innovation Days 2020 (Day 3)

This was the 8th edition of the Security Innovation Days 2020 so far. Three intense days in which innovation in cybersecurity and the digital transformation have been the essence...
New Capabilities for the Future of Cybersecurity: Security Innovation Days (Day 2)
ElevenPaths

New Capabilities for the Future of Cybersecurity: Security Innovation Days 2020 (Day 2)

Second day of the Security Innovation Days 2020, focusing on the new capabilities we have acquired as a cybersecurity company from Telefónica Tech. A few weeks ago, we announced...
ElevenPaths

Cybersecurity and Business in the New Era: Security Innovation Days 2020 (Day 1)

First day of the Security Innovation Days 2020 completed with more than 1500 people connected from all over the world. If you missed the first day of our cybersecurity...

Navegación de entradas

Previous articles
1 … 8 9 10 … 25
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration