Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • An IoT that deserves an Oscar Women’s Engineering Day: Building New Paths
  • Big Data
    • How will Education change post-covid? Success Story: pioneering project for economic and social development
  • Cybersecurity
    • Detecting the Indicators of An Attack «We are moving towards genderless professions», María Martínez

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Top 10 TED Talks to Learn about Cybersecurity
      Gonzalo Álvarez Marañón

      Top 10 TED Talks to Learn about Cyber Security

      Discover the top 10 talks to learn about cybersecurity and, at the same time, some ways to improve your own presentations.
      Cybersecurity Weekly Briefing September 12-18
      ElevenPaths

      Cybersecurity Weekly Briefing September 12-18

      PoC for Critical Vulnerability on Netlogon Secura researchers have published a tool to check whether a domain controller is vulnerable to the CVE-2020-1472 vulnerability on Netlogon. Last month, Microsoft patched...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Cyber Security Report
      Telefónica Tech

      Cyber Security Weekly Briefing 11-17 September

      S.O.V.A. – New Android banking trojan Researchers at Threat Fabric have discovered the existence, at least since the beginning of August, of a new banking trojan for Android which they...
      Telefónica Tech

      Cyber Security Weekly Briefing, 31 December – 6 January

      PyTorch’s dependency chain is breached PyTorch, a popular open-source machine learning framework, has warned users who installed PyTorch-nightly between 25 and 30 December 2022 to uninstall the framework and the...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ElevenPaths

      DevSecOps: 7 Key Factors for Implementing Security in Devops

      DevSecOps, also known as SecDevOps, is a software development philosophy that advocates the adoption of security throughout the software development lifecycle (SDLC). DevSecOps is more than just a specific...
      Cristina del Carmen Arroyo Siruela

      The human factor: a key element of cyber security

      When it is said that a server needs to be bastioned, cybersecurity personnel have an idea of what it is and what it consists of. But what about securing...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización sidebar: ElevenPaths

ChainLock, A Linux Tool for Locking Down Important Files
Innovation and Laboratory Area in ElevenPaths

ChainLock, A Linux Tool for Locking Down Important Files

Let’s say you have a valuable file on your computer, such as a bitcoin wallet file (“wallet.dat”), or some other file with sensitive information, and you decide put a...
DIARIO Already Detects "Stomped" Macros, But What Are They Exactly?
Innovation and Laboratory Area in ElevenPaths

DIARIO Already Detects “Stomped” Macros, But What Are They Exactly?

Few weeks ago, we presented DIARIO, the malware detector that respects the privacy of users, and we continue to improve it so that it detects more and better. We...
Has the Office as We Know It Come to an End?
Miguel Ángel Martos

Has the Office as We Know It Come to an End?

2020 has had a difficult start. We have learned that what was “usual” may not be the best. We should reconsider this idea of “the office” as the centre...
Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex
ElevenPaths

Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex

This collaboration provisions the offering of IoT Threat Detection, an incident monitoring and response service for IoT environments.This solution has the capability of learning and modelling the legitimate behaviour...
New TheTHE Version with URLScan and MalwareBazaar Plugins
Innovation and Laboratory Area in ElevenPaths

New TheTHE Version with URLScan and MalwareBazaar Plugins

The first time an IoC lay on your hands. Let’s say it is a hash, URL, IP or a suspicious domain. You need to know some basic information. Is...
Adversarial Attacks: The Enemy of Artificial Intelligence (II)
Franco Piergallini Guida

Adversarial Attacks: The Enemy of Artificial Intelligence (II)

In Machine and Deep Learning, as in any system, there are vulnerabilities and techniques that allow manipulating its behaviour at the mercy of an attacker. As we discussed in...
Cybersecurity Weekly Briefing September 19-25
ElevenPaths

Cybersecurity Weekly Briefing September 19-25

New attack vector for vulnerability in Citrix Workspace Pen Test Partners security researcher Ceri Coburn has discovered a new attack vector for the CVE-2020-8207 vulnerability in Citrix Workspace corrected in...
Blockchain, Cryptocurrencies, zkSTARKs and the Future of Privacy in a Decentralized World
Gonzalo Álvarez Marañón

Blockchain, Cryptocurrencies, zkSTARKs and the Future of Privacy in a Decentralised World

In the Renaissance Italy, duels between mathematicians were common, but not by crossing steels, but by solving difficult problems. One of the hardest bones to crack at the time...
Redefining Cloud Security with SASE
Samuel Bonete

Redefining Cloud Security with SASE

Stop for a moment and think: what percentage of your Internet traffic ends up on websites or traditional browsing and what proportion on SaaS services? If we analyse it...
Cybersecurity for industrial digitalisation: keys to a successful approach
ElevenPaths

Cybersecurity for Industrial Digitalisation: Keys to a Successful Approach

Digital technologies, and in particular what has been agreed to be called IoT (Internet of Things), bring a world of possibilities that organisations of any sector cannot fail to...

Navegación de entradas

Previous articles
1 … 10 11 12 … 24
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration