Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • AI of Things(I): Multiplying the value of connected things IoT Trends for 2017, users in the spotlight
  • Big Data
    • DeepMindAI partners with Moorfields Eye Hospital to develop innovative sight-saving technology Marathon Commuters: Which nationalities spend most time travelling to and from work?
  • Cybersecurity
    • Detected an extension in Chrome Web Store, active from February, that steals credit cards #CyberSecurityPulse: From the bug bounties (traditional) to the data abuse bounties

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cyber Security Weekly Briefing 30 January - 5 February
      ElevenPaths

      Cyber Security Weekly Briefing 30 January – 5 February

      Chrome will reject Camerfirma’s certificates Google plans to ban and remove Chrome’s support for digital certificates issued by the certification authority (CA) Camerfirma, a Spanish company that is widely deployed...
      ElevenPaths Radio English #2 – Secure Homeworking
      ElevenPaths

      ElevenPaths Radio English #2 – Secure Homeworking

      It is increasingly common to see companies that offer their workers the possibility of working from home, combining it with work from the office, and even companies that are...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • David García

      What’s new in the OWASP 2021 ranking?

      OWASP, the foundation focused on web application security, has recently updated its ranking of the most prominent risks. Let’s take a look at the new reorganisation of the top,...
      ElevenPaths

      Analyzing browser extensions with Neto Console

      Fifteen days ago we published the first version of Neto, our extensions analyzer in Github. It was published under a free license, also during this time we have worked...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ElevenPaths

      DevSecOps: 7 Key Factors for Implementing Security in Devops

      DevSecOps, also known as SecDevOps, is a software development philosophy that advocates the adoption of security throughout the software development lifecycle (SDLC). DevSecOps is more than just a specific...
      ElevenPaths

      Cybersecurity Weekly Briefing October 17-23

      New banking trojan called Vizom IBM Security Trusteer’s research team has published a report analysing the new “Brazilian family” banking Trojan called Vizom. This malicious software uses similar techniques to...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización sidebar: ElevenPaths

Thinking About Attacks on WAFs Based on Machine Learning
Franco Piergallini Guida

Thinking About Attacks on WAFs Based on Machine Learning

One of the fundamental pieces for the correct implementation of machine and deep learning is data. This type of algorithm needs to consume, in some cases, a large amount...
Zerologon, Patch or Die!
Nacho Brihuega

Zerologon, Patch or Die!

Zerologon. If you are in the IT world and haven’t heard this name yet, you should be worried. Keep reading. Zerologon is possibly the vulnerability of this “special” year and...
The Future of Digital Signatures to Protect Your Money Lies in Threshold Cryptography
Gonzalo Álvarez Marañón

The Future of Digital Signatures to Protect Your Money Lies in Threshold Cryptography

Imagine you were such a modern person, that all your money was in cryptocurrency instead of in a traditional bank. If you have ever handled cryptocurrencies, you will know that they are...
Cybersecurity Weekly Briefing October 3-9
ElevenPaths

Cybersecurity Weekly Briefing October 3-9

New botnet detected that deletes data from the infected device A group of researchers from the company Netlab 360 published yesterday their latest findings on a new botnet that specialises...
The Dard Side of WebAssembly
Carlos Ávila

The Dark Side of WebAssembly

Nowadays, the technologies for developing software for webs are multiplying rapidly, while introducing, in some cases, new ways of attack or unexpected advantages for attackers. Let’s see what WebAssembly...
ElevenPaths SIEM Attack Framework
Innovation and Laboratory Area in ElevenPaths

New Version of Our SIEM Attack Framework, Now With 7 Manufacturers

For some time now, the ElevenPaths Innovation and Laboratory team has been working on different projects and research related to the security aspects of SIEM (Security Information and Event...
Security Innovation Days 2020: The New Era
ElevenPaths

Security Innovation Days 2020: The New Era

Cyber Security in the Digital Transformation Era There is no doubt about it, we are living times of constant changes at all possible levels. There are so many that we are talking about a change of...
Curiosities About Windows XP Code Leak
ElevenPaths

Curiosities About Windows XP Code Leak

A few days ago, attention was focused on Reddit, within a community that is characterised by its conspiracy theories. According to the news it consisted of filtering 43 GBs...
Introducing the New ElevenPaths Chief Security Envoys (CSEs) for 2020
ElevenPaths

Introducing the New ElevenPaths Chief Security Envoys (CSEs) for 2020

For several years now, in ElevenPaths there is a CSAs (Chief Security Ambassadors) figure. These are experts in cybersecurity, ambassadors of our brand around the world whose mission is to promote the culture of security...
Cybersecurity Weekly Briefing 26 September - 2 October
ElevenPaths

Cybersecurity Weekly Briefing 26 September – 2 October

The logistics giant CMA CGM affected by a cyber attack This week, the French logistics group CMA CGM, which operates in 160 different countries, reported via its website and social...

Navegación de entradas

Previous articles
1 … 9 10 11 … 24
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration