Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Waste Management in a Smart City – The Smart Bin The IoT to protect shipments
  • Big Data
    • Designing an OOH advertising map in Brazil Mum, when I grow up I want to be a hacker
  • Cybersecurity
    • You take a holiday, but your cybersecurity doesn’t: 5 tips to protect yourself this summer Monero says goodbye to the ASIC miners (at least for now)

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths approaches the cyber security paradigm shift and the new era' s digital transformation in the SID 2020
      ElevenPaths

      ElevenPaths Approaches the Cyber Security Paradigm Shift and the New Era’ s Digital Transformation in the SID 2020

      Telefónica Tech’s cyber security company is holding its 8th Security Innovation Days, this time in a virtual format and extending from one to three half-days, on October 20th, 21st...
      DIARIO
      Andrés Naranjo

      DIARIO: One More Weapon in Thehive’s Arsenal

      We already know that the weakest link in the cyber security chain is the user. Studies show that the main reason why a cyber-attack on a company is successful...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • What Kind of Professionals Work in Our Security Operations Center (SOC)?
      ElevenPaths

      What Kind of Professionals Work in Our Security Operations Center (SOC)?

      Discover the different profiles of the SOC professionals in this post, who work day and night to provide the best security to our customers.
      ElevenPaths

      Analyzing browser extensions with Neto Console

      Fifteen days ago we published the first version of Neto, our extensions analyzer in Github. It was published under a free license, also during this time we have worked...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex
      ElevenPaths

      Telefónica’s ElevenPaths enhances its global IoT security capabilities with Subex

      This collaboration provisions the offering of IoT Threat Detection, an incident monitoring and response service for IoT environments.This solution has the capability of learning and modelling the legitimate behaviour...
      Susana Alwasity

      Cybersecurity: “black swan“ events in a connected world

      In today’s society, technology has transformed the way we live, work and interact. A greater risk of cyber threats has arisen with the increased use of internet-connected devices and...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización sidebar: ElevenPaths

When Preventing a Cyberattack Becomes a Vital Decision
Diego Samuel Espitia

When Preventing a Cyberattack Becomes a Vital Decision

In recent years, the number of incidents in critical infrastructure networks and industrial systems has increased significantly. There have been attacks with a high degree of complexity and knowledge...
Analysis of APPs Related to COVID19 Using Tacyt (II)
Andrés Naranjo

Analysis of APPs Related to COVID19 Using Tacyt (II)

We continue with the research started in the previous entry in which we analysed these type of applications with our Tacyt tool. Regarding the application analysed, we can see...
Cybersecurity Weekly Briefing September 12-18
ElevenPaths

Cybersecurity Weekly Briefing September 12-18

PoC for Critical Vulnerability on Netlogon Secura researchers have published a tool to check whether a domain controller is vulnerable to the CVE-2020-1472 vulnerability on Netlogon. Last month, Microsoft patched...
FaceApp and Personal Data, Hadn´t We Talked About This Already?
Christian F. Espinosa Velarde

FaceApp and Personal Data, Hadn´t We Talked About This Already?

Hadn’t we already talked about this? The comeback of applications like FaceApp and the fuss caused by the photos generated, in which their users can appear as women being...
ElevenPaths Radio English #3 - Why is Cybersecurity So Necessary Today?
ElevenPaths

ElevenPaths Radio English #3 – Why is Cybersecurity So Necessary Today?

In this episode, Gabriel Bergel, our CSA in Chile, explains that nowadays there is no excuse for not being interested in cybersecurity. At a personal level, the use of...
Analysis of APPs Related to COVID19 Using Tacyt (I)
Andrés Naranjo

Analysis of APPs Related to COVID19 Using Tacyt (I)

Taking advantage of all the attention this issue is attracting, the official app markets, Google Play and Apple Store, have been daily deluged with applications. Both platforms, especially Android,...
What Do Criminals in the Ransomware Industry Recommend so that Ransomware Does Not Affect You?
Sergio de los Santos

What Do Criminals in the Ransomware Industry Recommend so that Ransomware Does Not Affect You?

We all know the security recommendations offered by professionals on malware protection. Frequently: use common sense (personally, one of the least applicable and abstract pieces of advice that can...
Cybersecurity Weekly Briefing September 5-11
ElevenPaths

Cybersecurity Weekly Briefing September 5-11

Microsoft Patch Tuesday Microsoft published on Tuesday its newsletter with updates for the month of September. In this new bulletin a total of 129 vulnerabilities have been corrected in 15...
Cybersecurity and Pandemic (II)
Gabriel Bergel

Cybersecurity and Pandemic (II)

We continue with the second part of this article in which we analyse the current situation in its three dimensions. Let’s remember that in the first part of the...
Indicators of Compromise, Key to Detecting and Solving Incidents in an Agile Way
Cytomic Team, unit of Panda Security

Indicators of Compromise, Key to Detecting and Solving Incidents in an Agile Way

Quick and agile response to incidents is a basic aspect of a good cybersecurity strategy. Little by little, more and more companies are becoming aware of this, and this...

Navegación de entradas

Previous articles
1 … 11 12 13 … 24
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Heartbleed plugin for FOCA
By now, everyone knows about Heartbleed. Just like we did for FaasT, we have created a plugin for FOCA (final version) one of our most downloaded tools. This plugin...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration