Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • How process automation can help your business What is Smart Retail?
  • Big Data
    • Telefónica Activation Programme: Innovate with IoT Big Data and the Blockchain phenomenon: Part II
  • Cybersecurity
    • The Formula for Successful Hybrid Working Detected an extension in Chrome Web Store, active from February, that steals credit cards

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Personalización sidebar: Telefonica Tech

Cybersecurity Weekly Briefing September 5-11
ElevenPaths

Cybersecurity Weekly Briefing September 5-11

Microsoft Patch Tuesday Microsoft published on Tuesday its newsletter with updates for the month of September. In this new bulletin a total of 129 vulnerabilities have been corrected in 15...
Cybersecurity and Pandemic (II)
Gabriel Bergel

Cybersecurity and Pandemic (II)

We continue with the second part of this article in which we analyse the current situation in its three dimensions. Let’s remember that in the first part of the...
Indicators of Compromise, Key to Detecting and Solving Incidents in an Agile Way
Cytomic Team, unit of Panda Security

Indicators of Compromise, Key to Detecting and Solving Incidents in an Agile Way

Quick and agile response to incidents is a basic aspect of a good cybersecurity strategy. Little by little, more and more companies are becoming aware of this, and this...
Our Story with Govertis
Carmen Dufur

Our Story With Govertis

Since José Mª Álvarez-Pallete announced the creation of Telefónica Tech last November, ElevenPaths has accelerated its pace to get the complicated yet exciting mission that was entrusted to us...
How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy
Gonzalo Álvarez Marañón

How to Track COVID-19 Infections, Discover Contacts On WhatsApp or Share Your Genes While Keeping Your Privacy

When you sign up for a new social network, such as WhatsApp, you are often asked if you want to find out who among your contacts is already part...
We acquire iHackLabs to boost the training of our ethical hackers
Alberto Cuesta Partida

We Acquire iHackLabs to Boost the Training of Our Ethical Hackers

Telefónica Tech, through ElevenPaths, incorporates the platforms and knowledge about cyber security training of the iHackLabs startup.
AI of Things

The art of communication in times of change

Confuncio said “what I hear, I forget; what I see, I remember; what I do, I learn”. By communicating we learn, and from Data Governance team we understand that...
Cybersecurity Weekly Briefing 29 August-4 September
ElevenPaths

Cybersecurity Weekly Briefing 29 August-4 September

Red Dawn, new attached document from Emotet The use of a new attached document template by Emotet has been identified over the past week. The name given by security researcher Joseph...
Cybersecurity Weekly Briefing August 22-28
ElevenPaths

Cybersecurity Weekly Briefing August 22-28

Conti ransomware distributed after Trickbot Conti is a relatively new ransomware that appeared in isolated attacks in December 2019 but started to become a relevant threat in June 2020, when...
SASE: The future of networks and security is now here
ElevenPaths

SASE: The Future of Networks and Security Is Now Here

Since Gartner published their report entitled “The Future of Security Networks is in the Cloud” in August 2019, which pointed out the concept of SASE as the key to...

Navegación de entradas

Previous articles
1 … 52 53 54 … 123
More articles
  • Telefónica Tech

Popular

ElevenPaths
Squeezing the numbers and facts of Google’s annual Android security report
Last month Google published its third annual security report on Android’s security protections, aiming to send a clear message to the world about mobile malware (or Potentially Harmful Applications...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
FOCA Final Version, the ultimate FOCA
You all know FOCA. Over the years, it had a great acceptation and became quite popular. Eleven Path has killed the FOCA to turn it into a professional service,...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration