Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • 5 ways the IoT is helping the Environment Reviewing what makes a smart city smart
  • Big Data
    • Business Message main players and roles LUCA’s Sports Analytics Week in Movistar Centre Barcelona
  • Cybersecurity
    • Move to the cloud with confidence supported by ElevenPaths and Check Point Dumpster diving in Bin Laden’s computers: malware, passwords, warez and metadata (I)

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cyber Security Weekly Briefing 30 January - 5 February
      ElevenPaths

      Cyber Security Weekly Briefing 30 January – 5 February

      Chrome will reject Camerfirma’s certificates Google plans to ban and remove Chrome’s support for digital certificates issued by the certification authority (CA) Camerfirma, a Spanish company that is widely deployed...
      Triki: Cookie Collection and Analysis Tool
      Juan Elosua Tomé

      Triki: Cookie Collection and Analysis Tool

      In July 2020, the Spanish Data Protection Agency, following the entry into force of the European General Data Protection Regulation and several consultations with the European Data Protection Committee...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Most Software Handling Files Overlooks SmartScreen in Windows
      Innovation and Laboratory Area in ElevenPaths

      Most Software Handling Files Overlooks SmartScreen in Windows

      We analyse how this protection component of Windows Defender works with downloaded files.
      How the "antimalware" XProtect for MacOS works and why it detects poorly and badly
      ElevenPaths

      How the “antimalware” XProtect for MacOS works and why it detects poorly and badly

      Recently, MacOS included a signature in its integrated antivirus, intended to detect a binary for Windows; but, does this detection make sense? We could think it does, as a...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • How to forecast the future and reduce uncertainty thanks to Bayesian inference (I)
      ElevenPaths

      How to forecast the future and reduce uncertainty thanks to Bayesian inference (I)

      Imagine that you come back home from San Francisco, just arrived from the RSA Conference. You are unpacking your suitcase, open the drawer where you store your underwear and…...
      Snitch Cryptography: How to Crack Tamper-Proof Devices
      Gonzalo Álvarez Marañón

      Snitch Cryptography: How to Crack Tamper-Proof Devices

      Google’s Titan Security Key or YubiKey from Yubico are the ultimate trend in multi-factor authentication security. According to Google’s own website: «The keys have a hardware chip with firmware designed...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización cabecera: ElevenPaths

Cybersecurity Weekly Briefing July 4-10
ElevenPaths

Cybersecurity Weekly Briefing July 4-10

RCE Vulnerability in F5’s BIG-IP (CVE-2020-5902) Last Wednesday a new critical Remote Code Execution vulnerability (CVE-2020-5902 CVSSv3 10)  was published for F5’s Traffic Management User Interface (TMUI). This vulnerability allows...
How to Protect Yourself from Pandemic Cyberattacks Using Free Tools
Diego Samuel Espitia

How to Protect Yourself from Pandemic Cyberattacks Using Free Tools

Find out which free tools you can use to protect your computer from common cyberthreats and how to configure them correctly.
ElevenPaths Radio English #1 - Skills of a Cybersecurity Professional
ElevenPaths

ElevenPaths Radio English #1 – Skills of a Cybersecurity Professional

In this first episode, our CSA Deepak Daswani discusses what a true cybersecurity professional must have to be valuable to companies.
Adversarial Attacks: The Enemy of Artificial Intelligence
Franco Piergallini Guida

Adversarial Attacks: The Enemy of Artificial Intelligence

What happens when the data used by artificial intelligence to predict behaviour is manipulated? Is this an attack vector?
Telefónica Invests in Nozomi Networks, a Leading Company in OT and IoT Security
ElevenPaths

Telefónica Invests in Nozomi Networks, a Leading Company in OT and IoT Security

The investment reinforces an earlier joint services agreement with Nozomi Networks and ElevenPaths, Telefónica Tech’s cybersecurity company
OpenPGP: Desperately Seeking Kristian
Sergio de los Santos

OpenPGP: Desperately Seeking Kristian

Open Source applications run on a server system that has never worked properly. Why does this happen?
ElevenPaths

Cybersecurity Weekly Briefing June 27-July 3

Adobe, Mastercard and Visa Warn of the Need to Upgrade to Magento 2.x Payment providers Visa and Mastercard, together with Adobe, have tried for the last time to convince online...
New Call: ElevenPaths CSE Programme
ElevenPaths

New Call: ElevenPaths CSE Programme

If you are passionate about cybersecurity, join the ElevenPaths CSE programme and enjoy all its benefits. Don't miss it!
COVID-19, Insight from the Telco Security Alliance
ElevenPaths

COVID-19, Insight from the Telco Security Alliance

How have cybercriminals behaved during the COVID-19 pandemic? Find out in this ElevenPaths report with Alien Labs and Trustwave.
Looking for a MDR partner? Beware, not all MDRs are the same
Nikolaos Tsouroulas

Looking for a MDR partner? Beware, not all MDRs are the same

Are you throwing more money than you can afford into your SOC but still failing to detect and respond quickly enough to incidents? Have you suffered the impact of...

Navegación de entradas

Previous articles
1 … 15 16 17 … 25
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration