Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • A world-champion IoT Energy efficiency switches to the Smart side
  • Big Data
    • How has the NFL Super Bowl evolved with the introduction of Big Data? Groundbreaking study exposes the extent of UK gender bias
  • Cybersecurity
    • New ElevenPaths DoH Server (Beta) That Filters Out Malicious Domains Cyber Security Weekly Briefing 25 September – 1 October

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Woman working on a computer. Photo: Unsplash
      Diego Samuel Espitia

      Where is your company on the cybersecurity journey?

      Although the cybersecurity path is not linear and each company has its own characteristics, experience has allowed us to classify companies into five levels of cybersecurity evolution. The existence of...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Telefónica Tech

      Cyber Security Weekly Briefing, 22 – 28 April

      SolarWinds fixes high severity vulnerabilities In its latest security update, SolarWinds has fixed a total of 2 high-severity vulnerabilities, which could lead to command execution and privilege escalation. The more...
      Cybersecurity Weekly Briefing September 12-18
      ElevenPaths

      Cybersecurity Weekly Briefing September 12-18

      PoC for Critical Vulnerability on Netlogon Secura researchers have published a tool to check whether a domain controller is vulnerable to the CVE-2020-1472 vulnerability on Netlogon. Last month, Microsoft patched...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Photo: Bruno Gomiero / Unsplash
      José Vicente Catalán

      You take a holiday, but your cybersecurity doesn’t: 5 tips to protect yourself this summer

      Holidays are a necessity, that’s for sure. Everyone needs to relax, to spend quality time with family and friends, to disconnect. But, ironically, in order to disconnect, we end...
      Alexandre Maravilla

      Digital Identity Wallets against identity theft fraud

      Identity theft or impersonation is a type of fraud in which criminals manage to supplant the identity of the person being deceived, based on the theft of their personal...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización sidebar: ElevenPaths

Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?
Gonzalo Álvarez Marañón

Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?

A business is considered agile if it is able to respond quickly to market changes, adapt to maintain stability. However, without cryptography there is no security and without security...
Approaching Cybersecurity in Industry 4.0: The Age of Connected Machines
Gabriel Álvarez Corrada

Approaching Cybersecurity in Industry 4.0: The Age of Connected Machines

Don’t run away yet! This era is not about machines enslaving humanity (at least, not yet…) but about the introduction of elements (IOT devices, cloud environments, IA, Big Data, SIEM,...
ElevenPaths

Cybersecurity Weekly Briefing October 17-23

New banking trojan called Vizom IBM Security Trusteer’s research team has published a report analysing the new “Brazilian family” banking Trojan called Vizom. This malicious software uses similar techniques to...
ElevenPaths

Innovation and New Cybersecurity Tools: Security Innovation Days 2020 (Day 3)

This was the 8th edition of the Security Innovation Days 2020 so far. Three intense days in which innovation in cybersecurity and the digital transformation have been the essence...
New Capabilities for the Future of Cybersecurity: Security Innovation Days (Day 2)
ElevenPaths

New Capabilities for the Future of Cybersecurity: Security Innovation Days 2020 (Day 2)

Second day of the Security Innovation Days 2020, focusing on the new capabilities we have acquired as a cybersecurity company from Telefónica Tech. A few weeks ago, we announced...
ElevenPaths

Cybersecurity and Business in the New Era: Security Innovation Days 2020 (Day 1)

First day of the Security Innovation Days 2020 completed with more than 1500 people connected from all over the world. If you missed the first day of our cybersecurity...
Encryption That Preserves The Format To Ensure The Privacy Of Financial And Personal Data
Gonzalo Álvarez Marañón

Encryption That Preserves The Format To Ensure The Privacy Of Financial And Personal Data

Your personal information swarms through thousands of databases of public and private organizations. How do you protect its confidentiality so that it does not fall into the wrong hands?...
ElevenPaths approaches the cyber security paradigm shift and the new era' s digital transformation in the SID 2020
ElevenPaths

ElevenPaths Approaches the Cyber Security Paradigm Shift and the New Era’ s Digital Transformation in the SID 2020

Telefónica Tech’s cyber security company is holding its 8th Security Innovation Days, this time in a virtual format and extending from one to three half-days, on October 20th, 21st...
Steps to move security solutions forward in the face of current world challenges
Alejandro Maroto

Steps to move security solutions forward in the face of current world challenges

Palo Alto Networks founder Nir Zuk recently addressed the Telefónica Global Security Summit with some thoughts to share on the direction of security and implications of the COVID-19 pandemic....
Cybersecurity Weekly Briefing October 10-16
ElevenPaths

Cybersecurity Weekly Briefing October 10-16

Coalition of IT Companies Tries to Eliminate TrickBot Botnet A technology business conglomerate including Microsoft, FS-ISAC, ESET, Lumen’s Black Lotus Labs, NTT, and Symantec, have participated in the removal of...

Navegación de entradas

Previous articles
1 … 8 9 10 … 24
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
ElevenPaths
How to cause a DoS in Windows 8 explorer.exe
We have discovered by accident how to cause a Denial of Service (DoS) in Windows 8. It’s a little bug that is present in the last version of the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration