Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • What is Tank Telemetry? 10 sensors to create Smart Beaches
  • Big Data
    • How “intelligent” can Artificial Intelligence get? Artificial Intelligence in small and medium-sized enterprises
  • Cybersecurity
    • Introducing the New ElevenPaths Chief Security Envoys (CSEs) for 2020 Most read content in 2021

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths

      ElevenPaths further strengthens its reputation as a cybersecurity services provider

      Today was the fifth edition of the Security Day event, organized by ElevenPaths, the Telefónica Cybersecurity Unit, which took place in Madrid, under the slogan “Cybersecurity On Board“. This...
      Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?
      Sergio de los Santos

      Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?

      Conti, the fastest ransomware, is just one example of how this threat is evolving. Discover what tricks it uses and why in this article.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • David García

      Will Rust save the world? (II)

      We saw in the previous article the problems of manual memory management, but also the pitfalls of automatic memory management in languages like Java. But what if there was...
      Adversarial Attacks: The Enemy of Artificial Intelligence
      Franco Piergallini Guida

      Adversarial Attacks: The Enemy of Artificial Intelligence

      What happens when the data used by artificial intelligence to predict behaviour is manipulated? Is this an attack vector?
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Telefónica Tech's Cybersecurity Unit Becomes Part of The European Commission's Cybersecurity Atlas
      Innovation and Laboratory Area in ElevenPaths

      Telefónica Tech’s Cybersecurity Unit Becomes Part of The European Commission’s Cybersecurity Atlas

      Telefónica Tech’s Innovation and Laboratory Area in cyber security has been included as part of the European Commission’s Cybersecurity Atlas, a knowledge management platform that maps, classifies, visualises and...
      Photo: Christin Hume / Unsplash
      Telefónica Tech

      Cyber Security Weekly Briefing, 6 – 10 June

      LockBit threatens Mandiant after linking them to Evil Corp The LockBit 2.0 ransomware group announced on its dark web publishing page afternoon, 6 May, the alleged compromise of cybersecurity firm...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities
Florence Broderick

ElevenPaths is now a NoMoreRansom.org associated partner

Ransomware has a severe impact for IT companies and users. The increasing popularity of this security threat along with the profitable business for criminals make ransomware one of the...
ElevenPaths

ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency

Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick

ElevenPaths and iLife Security signed an agreement for implementing services in support, IT management and security

Aiming to help clients to adapt their systems in this new technological reality and its growing challenges in security matters, ElevenPaths and iLife Security, company specialized in Full Outsorcing...
Florence Broderick

ElevenPaths and Opencloud Factory signed an agreement to provide a unique solution for access control in corporative networks

ElevenPaths and Opencloud Factory signed a technological agreement, aiming to develop a unique solution for controlling the access in corporative networks. Thanks to this agreement, Mobile Connect...
Florence Broderick

ElevenPaths uncover several malicious apps on Google Play

ElevenPaths published recently an investigation revealing how malicious apps are opperating in Google PLay, by subscribing users under special tariff numbers. They analysed which type of app is mostly...
Florence Broderick

ElevenPaths and Consultores de Firma Avanzada together to protect Digital Banking, Insurance and Utility sectors

The scientific advances in facial and voice recognition, or biometric recognition for signatures are already a reality. In this context, we announce our most recent technological partnership with Consultores...
Florence Broderick

Latch Plugins Contest 2016: Videos and Documentation

You can find here the compilation of plugins submitted to the Latch Plugins Contest 2016. Congratulations to all participants for the work done and the results! Plugin Name: Latch OpenWRT. Author:...
Florence Broderick

ElevenPaths and Enigmasec associated to help small and medium organizations in face of the invasion of systems

The last week, we announced a partnership with Enigmasec, a company specialized in incident responses for cybersecurity, with the goal of improving its capabilities in cyber attacks that breaks...
Florence Broderick

ElevenPaths and Cyber Threat Alliance (CTA) collaborates in sharing information intelligence about cyber threats

In 2015, ElevenPaths, together with another market leader companies, such as Check Point, Cisco, Fortinet, Intel Security, Palo Alto and Symantec, brought together their strength to join a community...
Florence Broderick

ElevenPaths joins Saint Patrick Technology to offer security solutions based on the latest Big Data technologies

We announce today our most recent partnership with Saint Patrick Technology, the leading company in the development of solutions based on the latest technologies, such as AR, VR, NFC,...

Navegación de entradas

Previous articles
1 … 33 34 35 … 48
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Partnerships that escalate entrepreneurship and innovate the corporation: Ten Wayra startups that do business with Vivo
With 10 years of operations, Wayra has transformed the entrepreneurial ecosystem in Brazil and worldwide. Since its launch in 2011, when it was created to support entrepreneurship, Wayra has...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration