Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Your assets controlled with a click: Things Ready Link The heart of the airports pumps with IoT
  • Big Data
    • Ready for a Wild World: Big Data is key for humanitarian issues How can we bring Internet of Things to the rural world?
  • Cybersecurity
    • ElevenPaths and Chronicle partner to create new advanced managed security services Cyber Security Weekly Briefing January 9-15

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths at RSA Conference 2020
      ElevenPaths

      ElevenPaths at RSA Conference 2020

      Once again, we return to the RSA Conference, the reference event in the cybersecurity sector. From February 24 to 27 we will be presenting our proposal under the claim...
      ElevenPaths

      GSMA IoT Security Champion: Award to our IoT Security team

      We have a lot to be happy about! Our IoT Security team, dedicated to cybersecurity specialized in the increasingly relevant world of the Internet of Things, has received a...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • OpenPGP: Desperately Seeking Kristian
      Sergio de los Santos

      OpenPGP: Desperately Seeking Kristian

      Open Source applications run on a server system that has never worked properly. Why does this happen?
      ElevenPaths

      CryptoClipWatcher, our new tool against crypto clipboard hijacking techniques

      Since 2017, this technique is becoming quite popular. Cryptocurrency in general is a new target for malware, and mining Bitcoins is not profitable anymore in regular computers (maybe Monero...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ElevenPaths Cyber Security News 14-20
      ElevenPaths

      Cybersecurity Weekly Briefing November 14-20

      Malware distribution campaign supplants the identity of Spanish ministries ESET researchers warn of a malware distribution campaign that is impersonating Spanish ministries to distribute a malicious Android application through links...
      Plausibly Deniable Encryption or How to Reveal A Key Without Revealing It
      Gonzalo Álvarez Marañón

      Plausibly Deniable Encryption or How to Reveal A Key Without Revealing It

      When the secret police arrested Andrea at the airport checkpoint, she thought it was a mere formality reserved for all foreign citizens. When they searched her luggage and found...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización sidebar: ElevenPaths

Secure Telework, Applying Cybersecurity from Home
Andrés Naranjo

Secure Homeworking, Applying Cybersecurity from Home

Working from home makes it easier to reconcile these difficult days, but safety should not be overlooked. Telework safely with these tips.
More and shorter certificates with a lower lifetime: where is TLS going to?
Sergio de los Santos

More and Shorter Certificates with a Lower Lifetime: Where Is TLS Going to?

Cryptography is undergoing a renewal of all that is established. Know about all the events that are transforming the way the web works in this article.
What differential privacy is and why Google and Apple are using it with your data
Gonzalo Álvarez Marañón

What Differential Privacy Is and Why Google and Apple Are Using It with Your Data

Differential privacy allows you to know your users without compromising their privacy, but achieving it is a complex process. Here's why.
ElevenPaths at RSA Conference 2020
ElevenPaths

ElevenPaths at RSA Conference 2020

Once again, we return to the RSA Conference, the reference event in the cybersecurity sector. From February 24 to 27 we will be presenting our proposal under the claim...
ElevenPaths

APTualizator (II): Deconstructing Necurs Rootkit and Tools for Detecting and Removing It

This report has been drafted by Roberto Santos and Javier Rascón from the CSIRT-SCC (Security Cyberoperations Center) Research Team, in collaboration with ElevenPaths.  At the end of June 2019, a big Spanish company was attacked and thousands of their computers were impacted. Such was...
The Telco Security Alliance Bolsters Threat Detection Capabilities Through Shared Intelligence
ElevenPaths

The Telco Security Alliance Bolsters Threat Detection Capabilities Through Shared Intelligence

Dallas, Singapore and Madrid, February 18th, 2020 – The Telco Security Alliance today announced new collaborative efforts designed to further enhance the ability to detect and eliminate threats from customer environments.   Members of the alliance —...
TheTHE: The Threat Hunting Environment
Innovation and Laboratory Area in ElevenPaths

TheTHE: The Threat Hunting Environment, our tool for researchers

TheTHE, a unique tool within its category that allows analysts and hunters to carry out their research tasks in a more agile and practical way.
Apple introduces up to 14 signatures in XProtect given the malware flood for Mac
Sergio de los Santos

Apple introduces up to 14 signatures in XProtect given the malware flood for Mac

What is Apple doing about Shlayer malware? We analyze the main tools that MacOS is using to face this threat.
#CyberSecurityReport19H2: Qihoo is the company that most collaborates in the reporting of vulnerabilities in Microsoft products
ElevenPaths

#CyberSecurityReport19H2: Qihoo is the company that most collaborates in the reporting of vulnerabilities in Microsoft products

Currently, there are a number of reports addressing trends and summaries on security. However, at ElevenPaths we want to make a difference. Our Innovation and Labs team has just launched another release...
Our Telegram channel CyberSecurityPulse has already a webpage
Innovation and Laboratory Area in ElevenPaths

Our Telegram channel CyberSecurityPulse has already a webpage

Our Cybersecurity Pulse Telegram channel already has a website. Follow us to keep up to date with the most relevant cybersecurity news.

Navegación de entradas

Previous articles
1 … 20 21 22 … 24
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration