Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • FIWARE, the standard that IoT needs What’s the role of satellite connectivity in an IoT world?
  • Big Data
    • An introduction to Machine Learning: “What are Insights?” The Big Data and IoT applications fighting coronavirus
  • Cybersecurity
    • Cyber Security Weekly Briefing 13-19 November Keys to Implementing a 360 Corporate Digital Identity

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths Cyber Security News 14-20
      ElevenPaths

      Cybersecurity Weekly Briefing November 14-20

      Malware distribution campaign supplants the identity of Spanish ministries ESET researchers warn of a malware distribution campaign that is impersonating Spanish ministries to distribute a malicious Android application through links...
      ElevenPaths

      Cybersecurity Weekly Briefing June 20-26

      Millions of User Records Exposed on an Oracle Server Security researcher Anurag Sen has found an exposed database containing millions of records belonging to the company BlueKai, owned by Oracle....
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Detecting the Indicators of An Attack
      Diego Samuel Espitia

      Detecting the Indicators of An Attack

      We always choose to implement prevention and deterrence rather than containment mechanisms in security. However, the implementation of these mechanisms is not always effective or simple to set up...
      Telefónica Tech

      Cyber Security Weekly Briefing, 7 – 13 January

      ​Microsoft fixes 98 vulnerabilities on Patch Tuesday​ Microsoft has published its security bulletin for the month of January, in which it fixes a total of 98 vulnerabilities. Among these, an...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Cyber Security Weekly Briefing 4 – 7 january
      Telefónica Tech

      Cyber Security Weekly Briefing 1–7 january

      Mail delivery failure on Microsoft Exchange on-premises servers 2 January, Microsoft released a workaround to fix a bug that interrupted email delivery on Microsoft Exchange on-premises servers. The bug is a “year...
      Photo: Persnickety Prints / Unsplash
      Telefónica Tech

      Cyber Security Weekly Briefing, 8 — 19 August

      Google reports largest DDoS attack in history Google researchers have reported the largest DDoS attack ever recorded. Last 1 June, a Google Cloud Armor client received a series of HTTP...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización sidebar: ElevenPaths

University and Industry: Talent Is Out There (III)
Innovation and Laboratory Area in ElevenPaths

University and Industry: Talent Is Out There (III)

Discover the two projects of the 3rd edition of the Master's Degree in Cybersecurity from the UCAM in collaboration with Telefónica.
Security and Privacy on the "Internet of Health”
Carlos Ávila

Security and Privacy on the “Internet of Health”

Health comes first, but first we must ensure that our medical data have the appropriate security mechanisms to be reliable.
Challenges and Business Opportunities of Post Quantum Cryptography
Gonzalo Álvarez Marañón

Challenges and Business Opportunities of Post Quantum Cryptography

Sooner or later we'll have to make the leap to post-quantum cryptography. Discover this new system and prepare your organization for change.
Cybersecurity Weekly Briefing July 11-17
ElevenPaths

Cybersecurity Weekly Briefing July 11-17

Combining Citrix vulnerabilities to steal user sessions On July 7th, Citrix published a security bulletin to correct up to 11 vulnerabilities. A few days later, a report was released with...
Securing your Cloud Native Applications in AWS in the New Normal
Pablo Alarcón Padellano

Securing your Cloud Native Applications in AWS in the New Normal

The New Cloud Adoption Reality Yes, we are facing a New Normal, and we are living a new cloud adoption reality as well. Enterprise cloud adoption accelerates in face of...
New ElevenPaths DoH Server (Beta) That Filters Out Malicious Domains
Innovation and Laboratory Area in ElevenPaths

New ElevenPaths DoH Server (Beta) That Filters Out Malicious Domains

Discover the DoH server that filters out malicious domains in your browser thanks to our intelligence system.
Cybersecurity Weekly Briefing July 4-10
ElevenPaths

Cybersecurity Weekly Briefing July 4-10

RCE Vulnerability in F5’s BIG-IP (CVE-2020-5902) Last Wednesday a new critical Remote Code Execution vulnerability (CVE-2020-5902 CVSSv3 10)  was published for F5’s Traffic Management User Interface (TMUI). This vulnerability allows...
How to Protect Yourself from Pandemic Cyberattacks Using Free Tools
Diego Samuel Espitia

How to Protect Yourself from Pandemic Cyberattacks Using Free Tools

Find out which free tools you can use to protect your computer from common cyberthreats and how to configure them correctly.
ElevenPaths Radio English #1 - Skills of a Cybersecurity Professional
ElevenPaths

ElevenPaths Radio English #1 – Skills of a Cybersecurity Professional

In this first episode, our CSA Deepak Daswani discusses what a true cybersecurity professional must have to be valuable to companies.
Adversarial Attacks: The Enemy of Artificial Intelligence
Franco Piergallini Guida

Adversarial Attacks: The Enemy of Artificial Intelligence

What happens when the data used by artificial intelligence to predict behaviour is manipulated? Is this an attack vector?

Navegación de entradas

Previous articles
1 … 14 15 16 … 24
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Florence Broderick
Information leakage in Data Loss Prevention leader companies
Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration