Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • World Energy Saving Day: Efficiency to drive progress The Internet of Water
  • Big Data
    • Waste Management in a Smart City – The Smart Bin 5 medical uses of Virtual Reality
  • Cybersecurity
    • #CyberSecurityPulse: Changing stereotypes in the security sector ElevenPaths Approaches the Cyber Security Paradigm Shift and the New Era’ s Digital Transformation in the SID 2020

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Innovation and Laboratory Area in ElevenPaths

      Google report 17% of Microsoft vulnerabilities. Microsoft and Qihoo, 10%

      Who finds more vulnerabilities in Microsoft products? What percentage of vulnerabilities are discovered by Microsoft, other companies or vulnerability brokers? How many flaws have unknown discoverers? Over this report we have analyzed...
      4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools
      Innovation and Laboratory Area in ElevenPaths

      4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools

      Discover the tools we contribute to this important initiative launched by Europol to help ransomware victims.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      Cyber Security Weekly Briefing 31 October – 6 November

      Apple fixes 3 0-day vulnerabilities Apple, with the launch of the new iOS 14.2 version, has corrected three 0-day vulnerabilities that would be actively exploited and that would affect iPhone,...
      Cyber Securiry Report 2H 21
      Innovation and Laboratory Area in ElevenPaths

      #CyberSecurityReport21H1: More than 246 million OT cyber security events detected in six months

      There are many reports on security trends and summaries, but at Telefónica Tech we want to make a difference. From the Innovation and Lab team, we have just launched...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Cybersecurity Weekly Briefing August 8-14
      ElevenPaths

      Cybersecurity Weekly Briefing August 8-14

      Hackers attempt to exploit critical vulnerability in F5 BIG-IP ADC The FBI has issued a Private Industry Notification warning that a group of Iranian hackers have been trying to exploit...
      ElevenPaths SIEM Attack Framework
      Innovation and Laboratory Area in ElevenPaths

      New Version of Our SIEM Attack Framework, Now With 7 Manufacturers

      For some time now, the ElevenPaths Innovation and Laboratory team has been working on different projects and research related to the security aspects of SIEM (Security Information and Event...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities
David García

Will Rust save the world? (II)

We saw in the previous article the problems of manual memory management, but also the pitfalls of automatic memory management in languages like Java. But what if there was...
Sergio de los Santos

Four cyber security milestones that shaped the future of malware

A journey through the 15 years Microsoft has spent consolidating a strategy that has impacted cybersecurity globally
Telefónica Tech

Cyber Security Weekly Briefing, 15 – 19 May

Vulnerabilities in cloud platforms Otorio’s team of researchers found 11 vulnerabilities affecting different cloud management platform providers. Sierra Wireless, Teltonika Networks and InHand Networks are the affected companies. The security flaws...
Sergio de los Santos

Pay When You Get Infected by Ransomware? Many Shades of Grey

The Internet is full of articles explaining why ransomware should not be paid. And they are probably right, but if you don’t make a difference between the type of ransomware and...
Telefónica Tech

Cyber Security Weekly Briefing, 22 – 28 April

SolarWinds fixes high severity vulnerabilities In its latest security update, SolarWinds has fixed a total of 2 high-severity vulnerabilities, which could lead to command execution and privilege escalation. The more...
Juan Carlos Vigo López

Secure Digital Workplace: chronicle of a foretold (and necessary) evolution

The changes that have taken place in the Digital Workplace lately have put some technological areas under stress, as we have had to adapt to the evolutions during and...
Phoro: Priscilla du Preez / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 7 — 14 October

Critical vulnerability in Fortinet  Fortinet has issued a security advisory to its customers urging them to update their FortiGate firewalls and FortiProxy web proxy, in order to fix a critical authentication bypass...
Photo: Icons8 Team / Unsplash
Telefónica Tech

Attacking login credentials

An access credential is basically a username and password associated with a person and the access permissions granted to that person for an application, service or system. An access...
cyber security app iotm
Carlos Ávila

IoTM Mobile Applications and The Relevance Of Their Security

Almost a year ago in the article “Internet of Health“ I described how incredible is the amount of applications and devices that the medical industry has deployed and will...
ElevenPaths

DevSecOps: 7 Key Factors for Implementing Security in Devops

DevSecOps, also known as SecDevOps, is a software development philosophy that advocates the adoption of security throughout the software development lifecycle (SDLC). DevSecOps is more than just a specific...

Navegación de entradas

Volver a portada
1 2 … 48
More articles
  • Telefónica Tech

Popular

Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Cybersecurity Shot_LinkedIn information leakage
Here comes Cybersecurity Shot, a research report on current cases related to databases leaked online that includes leakage prevention recommendations. Every week in May and June we will be publishing...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration