Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Five keys of IoT in Industry 4.0 Chuck Martin: “The industry can anticipate consumers’ needs even before they feel that need. This is the future that awaits us on Internet of Things”
  • Big Data
    • When Big Data meets art World Health Day: Using Big Data to address depression
  • Cybersecurity
    • Cyber Security Weekly Briefing, 15 – 19 May Triki: Cookie Collection and Analysis Tool

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths

      SealSign integration with the Azure Key Vault

      ElevenPaths and Microsoft, thanks to Gradiant technology, have integrated the Azure Key Vault into the SealSign platform. This partnership provides a server-based digital signature and certificate safekeeping service, based...
      Security Innovation Days 2020: The New Era
      ElevenPaths

      Security Innovation Days 2020: The New Era

      Cyber Security in the Digital Transformation Era There is no doubt about it, we are living times of constant changes at all possible levels. There are so many that we are talking about a change of...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • WhatsApp, Telegram or Signal, Which One?
      ElevenPaths

      WhatsApp, Telegram or Signal, Which One?

      In the world of smartphones, 2021 began with a piece of news that has left no one indifferent: the update of WhatsApp’s terms and conditions of use. This measure,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 21 January – 3 February

      LockBit Green: new LockBit variant Researchers at vx-underground have recently detected that a new ransomware variant, called LockBit Green, is being used by the LockBit ransomware handlers. This new variant...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Security Briefing
      Telefónica Tech

      Cyber Security Weekly Briefing 16-22 October

      Zerodium interested in acquiring 0-days of Windows VPN software Information security company Zerodium has reported its willingness to purchase 0-day vulnerabilities targeting VPN service software for Windows systems: ExpressVPN, NordVPN...
      ElevenPaths

      Cyber Security Weekly Briefing 12-18 March

      Vishing by impersonating Microsoft The Office of Internet Security (OSI) has issued a security advisory to report an increase, in recent weeks, of fraudulent calls in which a supposed Microsoft...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización sidebar: ElevenPaths

Keys to Implementing a 360 Corporate Digital Identity
ElevenPaths

Keys to Implementing a 360 Corporate Digital Identity

We analyze the identity management issues and the characteristics that a comprehensive solution of this kind must have in all organizations.
Anti-Coronavirus Cryptography
Gonzalo Álvarez Marañón

Anti-Coronavirus Cryptography

Discover how your privacy is protected in Covid-19 infection tracing apps in this post.
Most Software Handling Files Overlooks SmartScreen in Windows
Innovation and Laboratory Area in ElevenPaths

Most Software Handling Files Overlooks SmartScreen in Windows

We analyse how this protection component of Windows Defender works with downloaded files.
Popular Docker Images under Security Scrutiny
Juan Elosua Tomé

Popular Docker Images under Security Scrutiny

Discover the research carried out by our TEGRA cybersecurity centre on this technology's images used in the development of applications.
ElevenPaths

Telefonica’s ElevenPaths Expands its Collaboration with Fortinet to Improve Industrial Sector Security

ElevenPaths and Fortinet partner to improve cybersecurity in industrial processes by delivering comprehensive OT, IT and IoT solutions to its customers.
Vendetta Group and the COVID-19 Phishing Emails
Miguel Ángel de Castro

Vendetta Group and the COVID-19 Phishing Emails

A new threat has entered the COVID-19 scene: the Vendetta Group. How are their phishing campaigns different from others?
Cybersecurity Weekly Briefing 6-12 June
ElevenPaths

Cybersecurity Weekly Briefing 6-12 June

Enel and Honda Compromised by Snake Ransomware Italian energy corporation Enel and Japanese automotive giant Honda were hit last weekend by ransomware attacks that would have impacted on their IT...
Interpretation and Evolution of MITRE ATT&CK: More "Horizontal" Coverage Doesn't Mean Better Protection
Cytomic Team, unit of Panda Security

Interpretation and Evolution of MITRE ATT&CK: More “Horizontal” Coverage Doesn’t Mean Better Protection

The Cytomic team, a unit of Panda Security, explains what the MITRE ATT&CK matrix is based on in order to standardise the behaviour of opponents.
AMSIext: Our Extension That Detects Malware in the Browser Memory
Innovation and Laboratory Area in ElevenPaths

AMSIext: Our Extension That Detects Malware in the Browser Memory

Given the evolution in malware propagation techniques, we need mechanisms to detect threats as soon as possible such as AMSIext.
Cybersecurity Weekly Briefing 30 May-5 June
ElevenPaths

Cybersecurity Weekly Briefing 30 May-5 June

Security Breach in 8Belts vpnMentor researchers discovered in mid-April a data breach in the 8Belts language learning platform due to an improper configuration on an Amazon Web Services S3 bucket....

Navegación de entradas

Previous articles
1 … 16 17 18 … 24
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Heartbleed plugin for FOCA
By now, everyone knows about Heartbleed. Just like we did for FaasT, we have created a plugin for FOCA (final version) one of our most downloaded tools. This plugin...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration