Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Cloud Computing, the great ally for the digitalisation of the sports sector (and for athletes) IoT Solutions World Congress
  • Big Data
    • LUCA Talk 5: Transforming the Tourism Industry with Dynamic Insights LUCA White Paper: Data as a Force for Good
  • Cybersecurity
    • Don’t confuse the frequency of an incident with the ease you remember it Tips to Download Apps Securely

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Telefónica Invests in Nozomi Networks, a Leading Company in OT and IoT Security
      ElevenPaths

      Telefónica Invests in Nozomi Networks, a Leading Company in OT and IoT Security

      The investment reinforces an earlier joint services agreement with Nozomi Networks and ElevenPaths, Telefónica Tech’s cybersecurity company
      Homeworking: Balancing Corporate Control and Employee Privacy (II)
      Antonio Gil Moyano

      Homeworking: Balancing Corporate Control and Employee Privacy (II)

      As a continuation of the first article in which we saw both the regulation of homeworking and the security and privacy measures in this modality, in this second issue...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      The Confirmation Bias: we seek the information that confirms our decisions, refusing their opposed evidences

      Imagine yourself in a lab over an experiment. You’re asked to analyze the following number sequence: 2, 4, 6 This sequence follows a rule. What do you think the rule is?...
      Cybersecurity for industrial digitalisation: keys to a successful approach
      ElevenPaths

      Cybersecurity for Industrial Digitalisation: Keys to a Successful Approach

      Digital technologies, and in particular what has been agreed to be called IoT (Internet of Things), bring a world of possibilities that organisations of any sector cannot fail to...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Your feelings influence your perception of risk and benefit more than you might think
      ElevenPaths

      Your feelings influence your perception of risk and benefit more than you might think

      Security is both a feeling and a reality —Bruce Schneier Daniel Gardner starts his book The Science of Fear with the shocking history of US September 11 attacks: And so in...
      Cyber Security Weekly Briefing 29 July
      Telefónica Tech

      Cyber Security Weekly Briefing, 23-29 July

      New Critical Vulnerability in SonicWall Products Researchers from DBappSecurity HAT lab have discovered a critical vulnerability that affects several SonicWall Analytics On-Prem and SonicWall Global Management System products. The vulnerability, a...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización cabecera: ElevenPaths

A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)
Sergio de los Santos

A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)

In 2008, Kaminsky shook the foundations of the Internet. A design flaw in the DNS made it possible to fake responses and send a victim wherever the attacker wanted....
ElevenPaths Cyber Security News 14-20
ElevenPaths

Cybersecurity Weekly Briefing November 14-20

Malware distribution campaign supplants the identity of Spanish ministries ESET researchers warn of a malware distribution campaign that is impersonating Spanish ministries to distribute a malicious Android application through links...
The Challenge of Online Identity (I): Identity Is the New Perimeter
Andrés Naranjo

The Challenge of Online Identity (I): Identity Is the New Perimeter

We often find ourselves in situations where we are faced with a mission and, as the mission goes on, we realise that the first choices we made were not...
Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later
Gonzalo Álvarez Marañón

Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later

Have you ever played rock, paper, scissors? I bet you have. Well, let’s put the tin lid on it: how would you play through the phone? One thing is...
How Traditional CA's Are Losing Control of Certificates and Possible Reasons Why Chrome Will Have a New Root Store
Sergio de los Santos

How Traditional CA’s Are Losing Control of Certificates and Possible Reasons Why Chrome Will Have a New Root Store

It’s all about trust. This phrase is valid in any field. Money, for example, is nothing more than a transfer of trust, because obviously we trust that for a...
Cyber Security Weekly Briefing November 7-13
ElevenPaths

Cybersecurity Weekly Briefing November 7-13

Links between Vatet, PyXie and Defray777 Researchers from Palo Alto Networks have investigated the families of malware and operational methodologies used by a threat agent that has managed to go...
5G Connectivity and its Impact on Industry 4.0: Maturity and Evolution
Gabriel Álvarez Corrada

5G Connectivity and its Impact on Industry 4.0: Maturity and Evolution

One of the factors that indicates the maturity of some branches of technology is the incorporation of improvements as this technology evolves, which are different from those considered at...
ElevenPaths Radio English #4 - Privacy and Personal Data Protection
ElevenPaths

ElevenPaths Radio English #4 – Privacy and Personal Data Protection

Privacy and personal data protection are two of the greatest concerns today due to the large amount of information leaking out to the media every day. Practically all big...
¿Ransomware in Pandemic or Ransomware Pandemic?
Gabriel Bergel

¿Ransomware in Pandemic or Ransomware Pandemic?

No one imagined what could happen in the field of cyber security during the Covid-19 pandemic. Perhaps some colleagues were visionary, or others were basically guided by the statistics...
ElevenPaths

Cyber Security Weekly Briefing 31 October – 6 November

Apple fixes 3 0-day vulnerabilities Apple, with the launch of the new iOS 14.2 version, has corrected three 0-day vulnerabilities that would be actively exploited and that would affect iPhone,...

Navegación de entradas

Previous articles
1 … 7 8 9 … 25
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration