Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The “Cable Girls” of today Your children’s toys are now connected
  • Big Data
    • Our role in digitalizing Latin America with Big Data Lessons learned from The Cambridge Analytica / Facebook scandal
  • Cybersecurity
    • How to become a cyber resilient organisation Cyber Security Weekly Briefing 18-24 September

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • The Challenge of Online Identity (I): Identity Is the New Perimeter
      Andrés Naranjo

      The Challenge of Online Identity (I): Identity Is the New Perimeter

      We often find ourselves in situations where we are faced with a mission and, as the mission goes on, we realise that the first choices we made were not...
      ElevenPaths Radio English #4 - Privacy and Personal Data Protection
      ElevenPaths

      ElevenPaths Radio English #4 – Privacy and Personal Data Protection

      Privacy and personal data protection are two of the greatest concerns today due to the large amount of information leaking out to the media every day. Practically all big...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      Cyber Security Weekly Briefing 28 November – 4 December

      New version of the TrickBot malware TrickBot botnet operators have added a new capability that allows them to interact with the BIOS or UEFI firmware of an infected computer. This...
      DIARIO Already Detects "Stomped" Macros, But What Are They Exactly?
      Innovation and Laboratory Area in ElevenPaths

      DIARIO Already Detects “Stomped” Macros, But What Are They Exactly?

      Few weeks ago, we presented DIARIO, the malware detector that respects the privacy of users, and we continue to improve it so that it detects more and better. We...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Tips to Download Apps Securely
      ElevenPaths

      Tips to Download Apps Securely

      The arrival of smartphones brought about a paradigm shift in the way we use and consume content through mobile devices. So much so that, from that moment on, they...
      5G Connectivity and its Impact on Industry 4.0: Maturity and Evolution
      Gabriel Álvarez Corrada

      5G Connectivity and its Impact on Industry 4.0: Maturity and Evolution

      One of the factors that indicates the maturity of some branches of technology is the incorporation of improvements as this technology evolves, which are different from those considered at...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización sidebar: ElevenPaths

Secure Telework, Applying Cybersecurity from Home
Andrés Naranjo

Secure Homeworking, Applying Cybersecurity from Home

Working from home makes it easier to reconcile these difficult days, but safety should not be overlooked. Telework safely with these tips.
More and shorter certificates with a lower lifetime: where is TLS going to?
Sergio de los Santos

More and Shorter Certificates with a Lower Lifetime: Where Is TLS Going to?

Cryptography is undergoing a renewal of all that is established. Know about all the events that are transforming the way the web works in this article.
What differential privacy is and why Google and Apple are using it with your data
Gonzalo Álvarez Marañón

What Differential Privacy Is and Why Google and Apple Are Using It with Your Data

Differential privacy allows you to know your users without compromising their privacy, but achieving it is a complex process. Here's why.
ElevenPaths at RSA Conference 2020
ElevenPaths

ElevenPaths at RSA Conference 2020

Once again, we return to the RSA Conference, the reference event in the cybersecurity sector. From February 24 to 27 we will be presenting our proposal under the claim...
ElevenPaths

APTualizator (II): Deconstructing Necurs Rootkit and Tools for Detecting and Removing It

This report has been drafted by Roberto Santos and Javier Rascón from the CSIRT-SCC (Security Cyberoperations Center) Research Team, in collaboration with ElevenPaths.  At the end of June 2019, a big Spanish company was attacked and thousands of their computers were impacted. Such was...
The Telco Security Alliance Bolsters Threat Detection Capabilities Through Shared Intelligence
ElevenPaths

The Telco Security Alliance Bolsters Threat Detection Capabilities Through Shared Intelligence

Dallas, Singapore and Madrid, February 18th, 2020 – The Telco Security Alliance today announced new collaborative efforts designed to further enhance the ability to detect and eliminate threats from customer environments.   Members of the alliance —...
TheTHE: The Threat Hunting Environment
Innovation and Laboratory Area in ElevenPaths

TheTHE: The Threat Hunting Environment, our tool for researchers

TheTHE, a unique tool within its category that allows analysts and hunters to carry out their research tasks in a more agile and practical way.
Apple introduces up to 14 signatures in XProtect given the malware flood for Mac
Sergio de los Santos

Apple introduces up to 14 signatures in XProtect given the malware flood for Mac

What is Apple doing about Shlayer malware? We analyze the main tools that MacOS is using to face this threat.
#CyberSecurityReport19H2: Qihoo is the company that most collaborates in the reporting of vulnerabilities in Microsoft products
ElevenPaths

#CyberSecurityReport19H2: Qihoo is the company that most collaborates in the reporting of vulnerabilities in Microsoft products

Currently, there are a number of reports addressing trends and summaries on security. However, at ElevenPaths we want to make a difference. Our Innovation and Labs team has just launched another release...
Our Telegram channel CyberSecurityPulse has already a webpage
Innovation and Laboratory Area in ElevenPaths

Our Telegram channel CyberSecurityPulse has already a webpage

Our Cybersecurity Pulse Telegram channel already has a website. Follow us to keep up to date with the most relevant cybersecurity news.

Navegación de entradas

Previous articles
1 … 20 21 22 … 24
More articles
  • Telefónica Tech

Popular

ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
Now you can use Latch with Dropbox, Facebook and others digital services
Many of you have asked us which services you can use Latch with, regretting that so far it could not be used in the more common services, such as...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Heartbleed plugin for FOCA
By now, everyone knows about Heartbleed. Just like we did for FaasT, we have created a plugin for FOCA (final version) one of our most downloaded tools. This plugin...
Florence Broderick
Responsible full disclosure… por ambas partes
La revelación responsable de vulnerabilidades es un viejo debate, pero no necesariamente zanjado. Vamos a observarlo desde el punto de vista del sistema vulnerable o afectado, no desde el...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration