Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • MWC 2018: How Telefónica will create a better future with IoT Bed time will never be the same
  • Big Data
    • Healthy Cities: a new paradigm to humanize smart technology How has the NFL Super Bowl evolved with the introduction of Big Data?
  • Cybersecurity
    • We Announce Our Digital Operation Centers, Where All Our Digital Services Are Focused We have a brand-new website! Get to know the new Telefónica Tech Cyber Security & Cloud website

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cybersecurity Weekly Briefing September 19-25
      ElevenPaths

      Cybersecurity Weekly Briefing September 19-25

      New attack vector for vulnerability in Citrix Workspace Pen Test Partners security researcher Ceri Coburn has discovered a new attack vector for the CVE-2020-8207 vulnerability in Citrix Workspace corrected in...
      ElevenPaths

      Telefonica’s ElevenPaths Expands its Collaboration with Fortinet to Improve Industrial Sector Security

      ElevenPaths and Fortinet partner to improve cybersecurity in industrial processes by delivering comprehensive OT, IT and IoT solutions to its customers.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      In search of improved cryptocurrency privacy with Dash, Zcash and Monero

      When we talk about cryptocurrencies we often find ourselves with the belief that their use is completely anonymous. However, those who have investigated a little about them (because it...
      Cybersecurity Weekly Briefing August 22-28
      ElevenPaths

      Cybersecurity Weekly Briefing August 22-28

      Conti ransomware distributed after Trickbot Conti is a relatively new ransomware that appeared in isolated attacks in December 2019 but started to become a relevant threat in June 2020, when...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ElevenPaths Radio English #1 - Skills of a Cybersecurity Professional
      ElevenPaths

      ElevenPaths Radio English #1 – Skills of a Cybersecurity Professional

      In this first episode, our CSA Deepak Daswani discusses what a true cybersecurity professional must have to be valuable to companies.
      Telefónica Tech

      Cyber Security Weekly Briefing, 14 – 20 January

      Critical vulnerabilities in Netcomm and TP-Link routers Several vulnerabilities have been discovered in Netcomm and TP-Link routers. On the one hand, the flaws, identified asCVE-2022-4873 and CVE-2022-4874, are a case of buffer...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización cabecera: ElevenPaths

A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)
Sergio de los Santos

A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)

In 2008, Kaminsky shook the foundations of the Internet. A design flaw in the DNS made it possible to fake responses and send a victim wherever the attacker wanted....
ElevenPaths Cyber Security News 14-20
ElevenPaths

Cybersecurity Weekly Briefing November 14-20

Malware distribution campaign supplants the identity of Spanish ministries ESET researchers warn of a malware distribution campaign that is impersonating Spanish ministries to distribute a malicious Android application through links...
The Challenge of Online Identity (I): Identity Is the New Perimeter
Andrés Naranjo

The Challenge of Online Identity (I): Identity Is the New Perimeter

We often find ourselves in situations where we are faced with a mission and, as the mission goes on, we realise that the first choices we made were not...
Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later
Gonzalo Álvarez Marañón

Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later

Have you ever played rock, paper, scissors? I bet you have. Well, let’s put the tin lid on it: how would you play through the phone? One thing is...
How Traditional CA's Are Losing Control of Certificates and Possible Reasons Why Chrome Will Have a New Root Store
Sergio de los Santos

How Traditional CA’s Are Losing Control of Certificates and Possible Reasons Why Chrome Will Have a New Root Store

It’s all about trust. This phrase is valid in any field. Money, for example, is nothing more than a transfer of trust, because obviously we trust that for a...
Cyber Security Weekly Briefing November 7-13
ElevenPaths

Cybersecurity Weekly Briefing November 7-13

Links between Vatet, PyXie and Defray777 Researchers from Palo Alto Networks have investigated the families of malware and operational methodologies used by a threat agent that has managed to go...
5G Connectivity and its Impact on Industry 4.0: Maturity and Evolution
Gabriel Álvarez Corrada

5G Connectivity and its Impact on Industry 4.0: Maturity and Evolution

One of the factors that indicates the maturity of some branches of technology is the incorporation of improvements as this technology evolves, which are different from those considered at...
ElevenPaths Radio English #4 - Privacy and Personal Data Protection
ElevenPaths

ElevenPaths Radio English #4 – Privacy and Personal Data Protection

Privacy and personal data protection are two of the greatest concerns today due to the large amount of information leaking out to the media every day. Practically all big...
¿Ransomware in Pandemic or Ransomware Pandemic?
Gabriel Bergel

¿Ransomware in Pandemic or Ransomware Pandemic?

No one imagined what could happen in the field of cyber security during the Covid-19 pandemic. Perhaps some colleagues were visionary, or others were basically guided by the statistics...
ElevenPaths

Cyber Security Weekly Briefing 31 October – 6 November

Apple fixes 3 0-day vulnerabilities Apple, with the launch of the new iOS 14.2 version, has corrected three 0-day vulnerabilities that would be actively exploited and that would affect iPhone,...

Navegación de entradas

Previous articles
1 … 7 8 9 … 25
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration