Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Five keys of IoT in Industry 4.0 Telefónica Activation Programme: Innovate with IoT
  • Big Data
    • Autonomous Vehicles: when will they be a reality? Is Data Science the Answer to Ocean Pollution?
  • Cybersecurity
    • Understanding Digital Certificates Europe’s new digital identity; sovereign identity wallets

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths has achieved Amazon Web Services (AWS) Security Competence status
      ElevenPaths

      ElevenPaths has achieved AWS Security Competency status

      Telefónica Tech’s cybersecurity company has demonstrated deep technical and consulting expertise helping large enterprises to adopt, develop and deploy complex cloud security projects that protect their environments on AWS...
      The First Official Vulnerabilities in Machine Learning in General
      Franco Piergallini Guida

      The First Official Vulnerabilities in Machine Learning in General

      Today you are nobody on the market if you do not use a Machine Learning system. Whether it is a system of nested “ifs” or a model of real...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates
      Gonzalo Álvarez Marañón

      Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates

      You may have noticed that most websites have a little padlock on them. If you click on it, a window will pop up stating that “the connection is secure”....
      Cyber Security Weekly Briefing November 7-13
      ElevenPaths

      Cybersecurity Weekly Briefing November 7-13

      Links between Vatet, PyXie and Defray777 Researchers from Palo Alto Networks have investigated the families of malware and operational methodologies used by a threat agent that has managed to go...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ElevenPaths-RSAConference
      ElevenPaths

      Cybersecurity and Business: ElevenPaths at the RSA Conference 2020

      We are back from the RSA Conference 2020, the year when the standard ‘humanization of technology’ has been set within the sector. We already predicted it last year with our commitment under...
      Challenges and Business Opportunities of Post Quantum Cryptography
      Gonzalo Álvarez Marañón

      Challenges and Business Opportunities of Post Quantum Cryptography

      Sooner or later we'll have to make the leap to post-quantum cryptography. Discover this new system and prepare your organization for change.
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización cabecera: ElevenPaths

Encryption That Preserves The Format To Ensure The Privacy Of Financial And Personal Data
Gonzalo Álvarez Marañón

Encryption That Preserves The Format To Ensure The Privacy Of Financial And Personal Data

Your personal information swarms through thousands of databases of public and private organizations. How do you protect its confidentiality so that it does not fall into the wrong hands?...
ElevenPaths approaches the cyber security paradigm shift and the new era' s digital transformation in the SID 2020
ElevenPaths

ElevenPaths Approaches the Cyber Security Paradigm Shift and the New Era’ s Digital Transformation in the SID 2020

Telefónica Tech’s cyber security company is holding its 8th Security Innovation Days, this time in a virtual format and extending from one to three half-days, on October 20th, 21st...
Steps to move security solutions forward in the face of current world challenges
Alejandro Maroto

Steps to move security solutions forward in the face of current world challenges

Palo Alto Networks founder Nir Zuk recently addressed the Telefónica Global Security Summit with some thoughts to share on the direction of security and implications of the COVID-19 pandemic....
Cybersecurity Weekly Briefing October 10-16
ElevenPaths

Cybersecurity Weekly Briefing October 10-16

Coalition of IT Companies Tries to Eliminate TrickBot Botnet A technology business conglomerate including Microsoft, FS-ISAC, ESET, Lumen’s Black Lotus Labs, NTT, and Symantec, have participated in the removal of...
Thinking About Attacks on WAFs Based on Machine Learning
Franco Piergallini Guida

Thinking About Attacks on WAFs Based on Machine Learning

One of the fundamental pieces for the correct implementation of machine and deep learning is data. This type of algorithm needs to consume, in some cases, a large amount...
Zerologon, Patch or Die!
Nacho Brihuega

Zerologon, Patch or Die!

Zerologon. If you are in the IT world and haven’t heard this name yet, you should be worried. Keep reading. Zerologon is possibly the vulnerability of this “special” year and...
The Future of Digital Signatures to Protect Your Money Lies in Threshold Cryptography
Gonzalo Álvarez Marañón

The Future of Digital Signatures to Protect Your Money Lies in Threshold Cryptography

Imagine you were such a modern person, that all your money was in cryptocurrency instead of in a traditional bank. If you have ever handled cryptocurrencies, you will know that they are...
Cybersecurity Weekly Briefing October 3-9
ElevenPaths

Cybersecurity Weekly Briefing October 3-9

New botnet detected that deletes data from the infected device A group of researchers from the company Netlab 360 published yesterday their latest findings on a new botnet that specialises...
The Dard Side of WebAssembly
Carlos Ávila

The Dark Side of WebAssembly

Nowadays, the technologies for developing software for webs are multiplying rapidly, while introducing, in some cases, new ways of attack or unexpected advantages for attackers. Let’s see what WebAssembly...
ElevenPaths SIEM Attack Framework
Innovation and Laboratory Area in ElevenPaths

New Version of Our SIEM Attack Framework, Now With 7 Manufacturers

For some time now, the ElevenPaths Innovation and Laboratory team has been working on different projects and research related to the security aspects of SIEM (Security Information and Event...

Navegación de entradas

Previous articles
1 … 9 10 11 … 25
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration