Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The emotions of IoT IoT to save the environment
  • Big Data
    • Internet of Things… Archaeological Sites Big Data in basic research: from elementary particles to black holes
  • Cybersecurity
    • Onboarding and biometric authentication to fight online fraud #CyberSecurityPulse: Last Update About Bad Rabbit Ransomware

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?
      Sergio de los Santos

      Conti, the Fastest Ransomware in the West: 32 Parallel CPU Threads, but… What for?

      Conti, the fastest ransomware, is just one example of how this threat is evolving. Discover what tricks it uses and why in this article.
      10 Tips for Secure Homework in Your Company
      ElevenPaths CSAs

      10 Tips for Secure Homeworking in Your Company

      We tell you ten measures you can take to make homeworking secure for your company, employees and customers.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths Radio English #1 - Skills of a Cybersecurity Professional
      ElevenPaths

      ElevenPaths Radio English #1 – Skills of a Cybersecurity Professional

      In this first episode, our CSA Deepak Daswani discusses what a true cybersecurity professional must have to be valuable to companies.
      ElevenPaths-RSAConference
      ElevenPaths

      Cybersecurity and Business: ElevenPaths at the RSA Conference 2020

      We are back from the RSA Conference 2020, the year when the standard ‘humanization of technology’ has been set within the sector. We already predicted it last year with our commitment under...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Cyber Security Weekly Briefing 30 January - 5 February
      ElevenPaths

      Cyber Security Weekly Briefing 30 January – 5 February

      Chrome will reject Camerfirma’s certificates Google plans to ban and remove Chrome’s support for digital certificates issued by the certification authority (CA) Camerfirma, a Spanish company that is widely deployed...
      Man searching in Google. Photo: Unsplash
      Sergio de los Santos

      Google takes a step forward to improve Certificate Transparency’s ecosystem: No dependence on Google

      Google will change certificate transparency requirements to make it more independent of itself
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities
Cyber Security Weekly Briefing March 20-26
ElevenPaths

Cyber Security Weekly Briefing March 20-26

Analysis of the new cyber-espionage group SilverFish The PRODAFT Threat Intelligence team (PTI) has discovered a highly sophisticated cybercriminal group called SilverFish, which operates exclusively against large enterprises and public...
Everything You Need to Know About SSL/TSL Certificates
ElevenPaths

Everything You Need to Know About SSL/TLS Certificates

What is a digital certificate? Secure Sockets Layer/Transport Layer Security digital certificate is the most widely used security protocol that enables encrypted data transfer between a web server and a...
NextDefense: The ultimate cyber defence solution for any organisation
Nikolaos Tsouroulas

NextDefense: The ultimate cyber defence solution for any organisation

It was on a Wednesday at 17:00h when the CIO of a potential customer, who was visiting our offices, asked for a meeting with the product team before leaving....
Your MacOS System Is Also A Target for Cybercrime – Protect It!
Carlos Ávila

Your MacOS System Is Also A Target for Cybercrime – Protect It!

According to statcounter, Apple’s operating system, macOS (formerly OSX) in particular, has a market share of around 17%, making it the second most widely used desktop operating system. This...
Cyber Security Weekly Briefing March 6-12
ElevenPaths

Cyber Security Weekly Briefing March 6-12

FluBot botnet behind messaging company impersonation campaign Last Friday, researchers at Threat Fabric named the threat behind the campaign to impersonate SMS messaging companies. Specifically, they talk about the Cabassous malware, a...
Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates
Gonzalo Álvarez Marañón

Nobody on The Internet Knows You Are A Dog, Even If You Use TLS Certificates

You may have noticed that most websites have a little padlock on them. If you click on it, a window will pop up stating that “the connection is secure”....
The New Digital Workforce and The Risks Around Robotics Process Automation (RPA)
Martiniano Mallavibarrena

The New Digital Workforce and The Risks Around Robotics Process Automation (RPA)

In recent years, many companies in different sectors have chosen to base their digital transformation on RPA – Robot Process Automation, which has facilitated the creation of hundreds of...
Cyber Security Weekly Briefing February 6-12
ElevenPaths

Cyber Security Weekly Briefing 27 February – 5 March

HAFNIUM attacks Microsoft Exchange servers with 0-day exploits Microsoft has detected the use of multiple 0-day exploits to carry out targeted attacks against on-premise versions of Microsoft Exchange Server (2013,...
New FARO Version: Create Your Own Plugin and Contribute to Its Evolution
Juan Elosua Tomé

New FARO Version: Create Your Own Plugin and Contribute to Its Evolution

We are pleased to announce the latest version of FARO, our open-source tool for detecting sensitive information, which we will briefly introduce in the following post. Nowadays, any organisation can...
Telefónica Tech's Cybersecurity Unit Becomes Part of The European Commission's Cybersecurity Atlas
Innovation and Laboratory Area in ElevenPaths

Telefónica Tech’s Cybersecurity Unit Becomes Part of The European Commission’s Cybersecurity Atlas

Telefónica Tech’s Innovation and Laboratory Area in cyber security has been included as part of the European Commission’s Cybersecurity Atlas, a knowledge management platform that maps, classifies, visualises and...

Navegación de entradas

Previous articles
1 … 4 5 6 … 48
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration