Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • MWC21: 5G and digital technologies, a reality for the post-covid recovery IoT, the new ally of renewable energies?
  • Big Data
    • Data and Human Resources: a close relationship How to fund your data journey
  • Cybersecurity
    • Cybersecurity Weekly Briefing August 15-21 COVID-19, Insight from the Telco Security Alliance

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cyber Security Weekly Briefing April 3-9
      ElevenPaths

      Cyber Security Weekly Briefing April 3-9

      Malware distribution campaign via LinkedIn The eSentire research team has published details on the analysis of a new malware distribution campaign via LinkedIn. Threat actors are sending zipped files under...
      Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data
      Gonzalo Álvarez Marañón

      Functional Cryptography: The Alternative to Homomorphic Encryption for Performing Calculations on Encrypted Data

      — Here are the exact coordinates of each operative deployed in the combat zone.— How much?­— 100.000.— That is too much.— And a code that displays on screen the...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Developing a Tool to Decrypt VCryptor Ransomware
      Innovation and Laboratory Area in ElevenPaths

      Developing a Tool to Decrypt VCryptor Ransomware (Available on NoMoreRansom.org)

      Discover how VCryptor ransomware works and the tool we have developed as part of NoMoreRansom.org to decrypt it.
      ElevenPaths

      Innovation and New Cybersecurity Tools: Security Innovation Days 2020 (Day 3)

      This was the 8th edition of the Security Innovation Days 2020 so far. Three intense days in which innovation in cybersecurity and the digital transformation have been the essence...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Cyber Security Weekly Briefing May 22-28
      ElevenPaths

      Cyber Security Weekly Briefing May 22-28

      ​​Windows HTTP protocol stack vulnerability also affects WinRM Security researchers have discovered that the vulnerability affecting the Windows IIS web server (CVE-2021-31166, CVSS 9.8), which resides in the HTTP protocol...
      Martiniano Mallavibarrena

      Cybersecurity in films: myth vs. reality with 10 examples

      The multiple aspects of cybersecurity (attacks, investigations, defence, disloyal employees, negligence, etc.) have been part of the plot of countless movies and TV series for years. In today’s society,...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización sidebar: ElevenPaths

DataCOVID-19: Fighting the Coronavirus by Using the Approximate Location Data of Your Smartphone
Gonzalo Álvarez Marañón

DataCOVID-19: Fighting the Coronavirus by Using the Approximate Location Data of Your Smartphone

Find the answers to your questions about how the Spanish Government is using Big Data to improve research on the COVID-19 pandemic.
Do You Dare to Develop a TheTHE Plugin? #EquinoxRoom111 Contest
Innovation and Laboratory Area in ElevenPaths

Do You Dare to Develop a TheTHE Plugin? #EquinoxRoom111 Contest

Dare yourself to participate in our contest by creating your own plugin for TheTHE, our tool for Threat Hunting teams.
What Kind of Professionals Work in Our Security Operations Center (SOC)?
ElevenPaths

What Kind of Professionals Work in Our Security Operations Center (SOC)?

Discover the different profiles of the SOC professionals in this post, who work day and night to provide the best security to our customers.
Risk Analysis Applied to COVID-19
Gabriel Bergel

Risk Analysis Applied to COVID-19

Our CSA Gabriel Bergel shows you how to apply the Risk Analysis methodology to the management of the COVID-19 threat.
Top 10 TED Talks to Learn about Cybersecurity
Gonzalo Álvarez Marañón

Top 10 TED Talks to Learn about Cyber Security

Discover the top 10 talks to learn about cybersecurity and, at the same time, some ways to improve your own presentations.
COVID-19: Risk Guide and Recommendations on Cyber Security
SCC CyberThreats Service

COVID-19: Risk Guide and Recommendations on Cyber Security

From the point of view of cyber security, the current situation caused by the coronavirus is also particularly worrying. Users and companies are being threatened. From the Telefonica’s SCC...
CARMA: Our Free Research-Focused Set of Android Malware Samples
Innovation and Laboratory Area in ElevenPaths

CARMA: Our Free Research-Focused Set of Android Malware Samples

Introducing CARMA, our free research-focused set of Android malware samples to enhance research into malware, adware and PUP detection.
Fake News and Cyberthreats in Times of Coronavirus
Helene Aguirre

Fake News and Cyberthreats in Times of Coronavirus

Helene Aguirre tells you how cyberthreats never stop, even in the case of a global pandemic health alert.
10 Tips for Secure Homework in Your Company
ElevenPaths CSAs

10 Tips for Secure Homeworking in Your Company

We tell you ten measures you can take to make homeworking secure for your company, employees and customers.
How to Detect and Protect Yourself from Phishing Attacks in Times of Coronavirus
ElevenPaths

How to Detect and Protect Yourself from Phishing Attacks in Times of Coronavirus

The overinformation caused by the huge amount of news we receive about coronavirus makes it harder to distinguish true from fake emails. This poses a great risk to people’s security, since it...

Navegación de entradas

Previous articles
1 … 19 20 21 … 24
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
ElevenPaths
How to cause a DoS in Windows 8 explorer.exe
We have discovered by accident how to cause a Denial of Service (DoS) in Windows 8. It’s a little bug that is present in the last version of the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration