Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The factory of the future How can we make water consumption more efficient?
  • Big Data
    • Towards the Fourth Industrial Revolution What is Natural Language Processing and its Use Cases?
  • Cybersecurity
    • m33tfinder: a vulnerability on Cisco Meeting Server detected by ElevenPaths Cybersecurity Weekly Briefing October 3-9

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Unravelling the Quantum Tangle of Cybersecurity: Quantum Computers, Quantum and Post-Quantum Cryptography
      Gonzalo Álvarez Marañón

      Unravelling the Quantum Tangle of Cybersecurity: Quantum Computers, Quantum and Post-Quantum Cryptography

      Do you know what’ s the difference between quantum computing, quantum cryptography and post-quantum cryptography? Because to be honest, they have (almost) nothing to do with each other. They...
      ElevenPaths Radio English #2 – Secure Homeworking
      ElevenPaths

      ElevenPaths Radio English #2 – Secure Homeworking

      It is increasingly common to see companies that offer their workers the possibility of working from home, combining it with work from the office, and even companies that are...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Download for Free Our New Book: ‘Irrational Decisions in Cybersecurity: How to Overcome Thinking Errors That Bias Your Judgements’
      ElevenPaths

      Download for Free Our New Book: ‘Irrational Decisions in Cybersecurity: How to Overcome Thinking Errors That Bias Your Judgements’

      In the transmedia universe of Blade Runner, replicants are artificial human beings manufactured by bioengineering by Tyrell Corporation. They are physically indistinguishable from a human, except for one detail: their lack of...
      Telefónica Tech

      Cyber Security Weekly Briefing, 18 – 24 February

      Fortinet fixes critical vulnerabilities in FortiNAC and FortiWeb Fortinet has issued a security advisory fixing two critical vulnerabilities affecting its FortiNAC and FortiWeb products. The security flaws have been registered...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • We Announce Our Digital Operation Centers, Where All Our Digital Services Are Focused
      ElevenPaths

      We Announce Our Digital Operation Centers, Where All Our Digital Services Are Focused

      The Telefónica Cybersecurity Unit holds its VII Security Innovation Day, under the motto ‘Guards for Digital Lives.’With speakers such as Chema Alonso, Pedro Pablo Pérez, Julia Perea and Ester...
      University and Industry: Talent Is Out There (III)
      Innovation and Laboratory Area in ElevenPaths

      University and Industry: Talent Is Out There (III)

      Discover the two projects of the 3rd edition of the Master's Degree in Cybersecurity from the UCAM in collaboration with Telefónica.
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización cabecera: ElevenPaths

Encryption That Preserves The Format To Ensure The Privacy Of Financial And Personal Data
Gonzalo Álvarez Marañón

Encryption That Preserves The Format To Ensure The Privacy Of Financial And Personal Data

Your personal information swarms through thousands of databases of public and private organizations. How do you protect its confidentiality so that it does not fall into the wrong hands?...
ElevenPaths approaches the cyber security paradigm shift and the new era' s digital transformation in the SID 2020
ElevenPaths

ElevenPaths Approaches the Cyber Security Paradigm Shift and the New Era’ s Digital Transformation in the SID 2020

Telefónica Tech’s cyber security company is holding its 8th Security Innovation Days, this time in a virtual format and extending from one to three half-days, on October 20th, 21st...
Steps to move security solutions forward in the face of current world challenges
Alejandro Maroto

Steps to move security solutions forward in the face of current world challenges

Palo Alto Networks founder Nir Zuk recently addressed the Telefónica Global Security Summit with some thoughts to share on the direction of security and implications of the COVID-19 pandemic....
Cybersecurity Weekly Briefing October 10-16
ElevenPaths

Cybersecurity Weekly Briefing October 10-16

Coalition of IT Companies Tries to Eliminate TrickBot Botnet A technology business conglomerate including Microsoft, FS-ISAC, ESET, Lumen’s Black Lotus Labs, NTT, and Symantec, have participated in the removal of...
Thinking About Attacks on WAFs Based on Machine Learning
Franco Piergallini Guida

Thinking About Attacks on WAFs Based on Machine Learning

One of the fundamental pieces for the correct implementation of machine and deep learning is data. This type of algorithm needs to consume, in some cases, a large amount...
Zerologon, Patch or Die!
Nacho Brihuega

Zerologon, Patch or Die!

Zerologon. If you are in the IT world and haven’t heard this name yet, you should be worried. Keep reading. Zerologon is possibly the vulnerability of this “special” year and...
The Future of Digital Signatures to Protect Your Money Lies in Threshold Cryptography
Gonzalo Álvarez Marañón

The Future of Digital Signatures to Protect Your Money Lies in Threshold Cryptography

Imagine you were such a modern person, that all your money was in cryptocurrency instead of in a traditional bank. If you have ever handled cryptocurrencies, you will know that they are...
Cybersecurity Weekly Briefing October 3-9
ElevenPaths

Cybersecurity Weekly Briefing October 3-9

New botnet detected that deletes data from the infected device A group of researchers from the company Netlab 360 published yesterday their latest findings on a new botnet that specialises...
The Dard Side of WebAssembly
Carlos Ávila

The Dark Side of WebAssembly

Nowadays, the technologies for developing software for webs are multiplying rapidly, while introducing, in some cases, new ways of attack or unexpected advantages for attackers. Let’s see what WebAssembly...
ElevenPaths SIEM Attack Framework
Innovation and Laboratory Area in ElevenPaths

New Version of Our SIEM Attack Framework, Now With 7 Manufacturers

For some time now, the ElevenPaths Innovation and Laboratory team has been working on different projects and research related to the security aspects of SIEM (Security Information and Event...

Navegación de entradas

Previous articles
1 … 9 10 11 … 25
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration