Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The horizon of IoT IoT and Big Data: the parents of carsharing
  • Big Data
    • Telefónica Activation Programme: Innovate with IoT How to fund your data journey
  • Cybersecurity
    • Cyber Security Weekly Briefing 11-17 September #CyberSecurityPulse: PyeongChang Olympics: A New False Flag Attack?

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?
      Gonzalo Álvarez Marañón

      Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?

      A business is considered agile if it is able to respond quickly to market changes, adapt to maintain stability. However, without cryptography there is no security and without security...
      Cyber Security Weekly Briefing May 29- June 4
      ElevenPaths

      Cyber Security Weekly Briefing May 29- June 4

      Vulnerability in SonicWall Network Security Manager SonicWall has released security patches to fix a vulnerability affecting local versions of the Network Security Manager (NSM) multi-user firewall management solution. Classified as CVE-2021-20026 and...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Cyber Security Weekly Briefing April 10-16
      ElevenPaths

      Cyber Security Weekly Briefing April 10-16

      ​0-days in Chrome and Edge Security researcher Rajvardhan Agarwal has discovered a 0-day vulnerability in the current versions of Google Chrome and Microsoft Edge, which he has made public via his...
      The hugest collection of usernames and passwords has been filtered…or not
      ElevenPaths

      The hugest collection of usernames and passwords has been filtered…or not (I)

      Sometimes, someone frees by mistake (or not) an enormous set of text files with millions of passwords inside. An almost endless list of e-mail accounts with their passwords or...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Analysis of APPs Related to COVID19 Using Tacyt (I)
      Andrés Naranjo

      Analysis of APPs Related to COVID19 Using Tacyt (I)

      Taking advantage of all the attention this issue is attracting, the official app markets, Google Play and Apple Store, have been daily deluged with applications. Both platforms, especially Android,...
      Person working on Windows 11 computer
      Sergio de los Santos

      Windows 11 security improves and joins Zero Trust

      We look at the security features included in Windows 11. Some of them are familiar but receive substantial changes and improvements.
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities
Florence Broderick

Cryptographic Security in IoT (III)

The proliferation of IoT services platforms and devices is occurring much faster than the adoption of security measures in its field. In the face of the urgent need for...
Florence Broderick

New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool

Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick

ElevenPaths and Symantec plan a joint offer Security Solutions for IoT environments

ElevenPaths collaborates with Symantec as technology provider for its Security certificate service for IoT. Madrid, October 31 2016.- ElevenPaths, Telefónica Cyber Security Unit, announce our intends to collaborate with Symantec,...
Florence Broderick

Now you can use Latch with Dropbox, Facebook and others digital services

Many of you have asked us which services you can use Latch with, regretting that so far it could not be used in the more common services, such as...
Florence Broderick

Cryptographic Security in IoT (II)

The proliferation of IoT services platforms and devices is occurring much faster than the adoption of security measures in its field. In the face of the urgent need for...
Florence Broderick

ElevenPaths acquires Shadow technology from Gradiant

Chema Alonso (Chief Data Officer of Telefónica and Chairman of ElevenPaths) announced during Security Innovation Day 2016, the purchase of the Gradiant’s solution for document security, SHADOW. ...
Pablo Alarcón Padellano

“State-of-the-art” Partners to tackle the new NIS and GDPR legislation

With a continued rise in cybercrime, and considering our global economy is dependent on data driven decision-making, the EU has published new legislation that will have an impact on...
Florence Broderick

Latch Plugins Contest: Remember the story!

Last week ElevenPaths launched a new edition of the Latch Plugins Contest, where you can win up to 5,000 dollars. But remember, what we’re looking for is imagination, talent,...
Florence Broderick

New tool: PESTO, PE (files) Statistical Tool

One of the fundamental threats in security are vulnerabilities in general and, in particular, being able to exploit them to execute code. Historically, dozens of technologies have been developed...
Florence Broderick

Latch Plugins Contest: the plugins and hacks contest in which you can win up to 5,000 USD

REGISTER NOW! ElevenPaths is announcing a new edition of the LatchPlugins Contest, a challenge for daring doers passionate about technology. Would you like to win 5,000 dollars? Then let...

Navegación de entradas

Previous articles
1 … 35 36 37 … 49
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration