Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • World Environment Day: Green digital transformation as a lever for change Telefónica Tech at the top of the IoT and Big Data podium
  • Big Data
    • How to build a Smart City: with IoT and Big Data AKQA uses AI to develop a completely new sport
  • Cybersecurity
    • Cyber Security Weekly Briefing May 8-14 Cyber Security Weekly Briefing, 1 — 8 July

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cyber Security Weekly Briefing December 12-18
      ElevenPaths

      Cyber Security Weekly Briefing December 12-18

      Supply Chain compromise: SolarWinds Orion FireEye researchers have unveiled a major global information theft and espionage operation that takes advantage of the supply chain to gain access to the systems...
      ElevenPaths expands its cloud security solutions portfolio with Prisma Cloud by Palo Alto Networks
      ElevenPaths

      ElevenPaths Expands Its Cloud Security Solutions Portfolio With Prisma Cloud By Palo Alto Networks

      ElevenPaths has achieved the status of Premier Public Cloud MSSP Partner with Palo Alto Networks. ElevenPaths, Telefónica Tech’s Cybersecurity Company, has expanded its Cloud Managed Security Service (Cloud MSS) by...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Telefónica Tech

      Cyber Security Weekly Briefing, 8 – 14 April

      Apple fixes two new actively exploited 0-day vulnerabilities Apple has released new security advisories about two new actively exploited 0-day vulnerabilities affecting iPhones, Macs and iPads. First, there is the...
      Cybersecurity Weekly Briefing July 18-24
      ElevenPaths

      Cybersecurity Weekly Briefing July 18-24

      New Emotet Campaign after 5 Months of Inactivity After several months of inactivity, Emotet is back with a massive sending of reply-chain and payment emails, among others, that include malicious...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Cyber Security Weekly Briefing February 6-12
      ElevenPaths

      Cyber Security Weekly Briefing February 6-12

      Attempted contamination of drinking water through a cyber-attack An unidentified threat actor reportedly accessed computer systems at the City of Oldsmar’s water treatment plant in Florida, US, and altered the...
      #LadyHacker blog
      ElevenPaths

      When I grow up I want to be… Engineer

      “What do you want to be when you grow up? A classic. So simple, yet so complex, and curiously so often asked when we are just kids… when perhaps...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Personalización sidebar: ElevenPaths

ElevenPaths

Cybersecurity Weekly Briefing August 1-7

Database of +900 Pulse Secure VPN Enterprise Servers An underground forum post has been detected showing the existence of a database containing data collected on more than 900 Pulse Secure...
ElevenPaths Radio English #2 – Secure Homeworking
ElevenPaths

ElevenPaths Radio English #2 – Secure Homeworking

It is increasingly common to see companies that offer their workers the possibility of working from home, combining it with work from the office, and even companies that are...
ElevenPaths

ElevenPaths Joins OpenSSF to Enhance Open Source Software Security

This new Open Source Security Foundation (OpenSSF) brings together leading technology companies such as Microsoft, Google, Red Hat and IBM, among others.It combines efforts from the Core Infrastructure Initiative,...
Innovation and Laboratory Area in ElevenPaths

ClipBanker Malware Tries to Stop Our Defence Tool CryptoClipWatcher

The malware capable of modifying the clipboard to “switch” the crypto wallet still exists. To fight it, ElevenPaths developed CryptoClipWatcher, a tool that monitors the clipboard and alerts if...
Cybersecurity and Pandemic (I): People
Gabriel Bergel

Cybersecurity and Pandemic (I): People

Cybersecurity is even more important in these times of pandemic and increasing cyberattacks, yes, but in addition to being a business focus at the corporate level, it must also...
Cybersecurity Weekly Briefing July 25-31
ElevenPaths

Cybersecurity Weekly Briefing July 25-31

BootHole: Vulnerability in GRUB2 Eclypsium researchers have discovered a buffer overflow vulnerability in the GRUB2 bootloader that could be used to execute arbitrary code during the boot process. It has...
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityReport20H1: Microsoft Fixes Many More Vulnerabilities, but Detects Far Fewer

Understand the risks of the current cybersecurity scene with this biannual report by our Innovation and Laboratory Area.
Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?
Sergio de los Santos

Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?

Conti, the fastest ransomware, is just one example of how this threat is evolving. Discover what tricks it uses and why in this article.
4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools
Innovation and Laboratory Area in ElevenPaths

4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools

Discover the tools we contribute to this important initiative launched by Europol to help ransomware victims.
Cybersecurity Weekly Briefing July 18-24
ElevenPaths

Cybersecurity Weekly Briefing July 18-24

New Emotet Campaign after 5 Months of Inactivity After several months of inactivity, Emotet is back with a massive sending of reply-chain and payment emails, among others, that include malicious...

Navegación de entradas

Previous articles
1 … 13 14 15 … 24
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Florence Broderick
Information leakage in Data Loss Prevention leader companies
Gartner has released a study that classifies the most important companies that offer Data Loss Prevention (DLP) solutions depending on their position, strategy, effectiveness, and market leadership. We have made...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration