Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The “Cable Girls” of today IoT is increasingly getting safer
  • Big Data
    • 5 in 5: How to successfully implement AI into your business (EP 2) Human Intelligence driving AI: Demand for Data Scientists
  • Cybersecurity
    • Winner of the #EquinoxRoom111 Contest #CyberSecurityReport19H2: Qihoo is the company that most collaborates in the reporting of vulnerabilities in Microsoft products

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths

      #CyberSecurityPulse: Google’s project to fight election attacks

      On the night of the primary elections in May, the residents from the county Knox, Tennessee, did not know who had won for about an hour. They did not...
      ElevenPaths

      #CyberSecurityPulse: From the bug bounties (traditional) to the data abuse bounties

      Social networks image The Internet giants are going to great lengths to be transparent with their communication about the information they are gathering from their users. In the case...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Decepticons vs. Covid-19: The Ultimate Battle
      Gabriel Bergel

      Decepticons vs. Covid-19: The Ultimate Battle

      Social engineering is being used more than ever by cybercriminals. What do Decepticons have to do with it?
      ElevenPaths

      You are less rational than you think when you take decisions under uncertain conditions

      I propose you the following game of luck:   Option A: I give 1,000 € to you with a probability of 100%. Option B: Let’s leave it to heads or tails: if...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Cybersecurity Weekly Briefing September 5-11
      ElevenPaths

      Cybersecurity Weekly Briefing September 5-11

      Microsoft Patch Tuesday Microsoft published on Tuesday its newsletter with updates for the month of September. In this new bulletin a total of 129 vulnerabilities have been corrected in 15...
      Cristina del Carmen Arroyo Siruela

      The human factor: a key element of cyber security

      When it is said that a server needs to be bastioned, cybersecurity personnel have an idea of what it is and what it consists of. But what about securing...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización cabecera: ElevenPaths

China Leads the Race Towards an Attack-Proof Quantum Internet
Gonzalo Álvarez Marañón

China Leads the Race Towards an Attack-Proof Quantum Internet

We are one step closer to reaching the Holy Grail of cryptography. Discover the details in this article.
Ripple20: Internet Broken Down Again
Sergio de los Santos

Ripple20: Internet Broken Down Again

Billions of IoT devices have been affected. However, this is not the first time a catastrophe of this magnitude has occurred.
ElevenPaths

Cybersecurity Weekly Briefing June 20-26

Millions of User Records Exposed on an Oracle Server Security researcher Anurag Sen has found an exposed database containing millions of records belonging to the company BlueKai, owned by Oracle....
Move to the cloud with confidence supported by ElevenPaths and Check Point
Pablo Alarcón Padellano

Move to the cloud with confidence supported by ElevenPaths and Check Point

The goal of ElevenPaths Public Cloud Managed Security Services is to help you to secure any cloud workload and to mitigate cloud risks.
Keys to Implementing a 360 Corporate Digital Identity
ElevenPaths

Keys to Implementing a 360 Corporate Digital Identity

We analyze the identity management issues and the characteristics that a comprehensive solution of this kind must have in all organizations.
Anti-Coronavirus Cryptography
Gonzalo Álvarez Marañón

Anti-Coronavirus Cryptography

Discover how your privacy is protected in Covid-19 infection tracing apps in this post.
Most Software Handling Files Overlooks SmartScreen in Windows
Innovation and Laboratory Area in ElevenPaths

Most Software Handling Files Overlooks SmartScreen in Windows

We analyse how this protection component of Windows Defender works with downloaded files.
Popular Docker Images under Security Scrutiny
Juan Elosua Tomé

Popular Docker Images under Security Scrutiny

Discover the research carried out by our TEGRA cybersecurity centre on this technology's images used in the development of applications.
ElevenPaths

Telefonica’s ElevenPaths Expands its Collaboration with Fortinet to Improve Industrial Sector Security

ElevenPaths and Fortinet partner to improve cybersecurity in industrial processes by delivering comprehensive OT, IT and IoT solutions to its customers.
Vendetta Group and the COVID-19 Phishing Emails
Miguel Ángel de Castro

Vendetta Group and the COVID-19 Phishing Emails

A new threat has entered the COVID-19 scene: the Vendetta Group. How are their phishing campaigns different from others?

Navegación de entradas

Previous articles
1 … 16 17 18 … 25
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
ElevenPaths announced its new strategic alliances in the third Security Day
In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented. Madrid, 26th May....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to use Metashield protector for Client and why using it
Metashield is an Eleven Paths product that allows to clean up metadata from most of office documents. It tries to cover a gap where there seems not to exist any...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration