Alexandre Maravilla Are SMS for sending verification codes secure? I recently forgot the password to access the personal area of my current bank’s online banking app. I show you the process of resetting the password, carried out from...
Telefónica Tech Cyber Security Weekly Briefing 28 February – 4 March Daxin: highly sophisticated backdoor Researchers at Symantec have published a paper reporting a new backdoor they have called Daxin, which they attribute to actors linked to China. According to Symantec,...
Telefónica Tech AI of Things(I): Multiplying the value of connected things Written by Álvaro Capell and David Bonomo The recent media explosion of the metaverse concept has overshadowed another technological trend, augmented or mixed reality, which is transforming the way we...
Telefónica Tech Cyber Security Weekly Briefing 19-25 February New privilege escalation flaw in Linux Security researchers at Qualys have discovered seven flaws in Canonical’s Snap software packaging and deployment system used in operating systems that use the Linux...
Emilio Moreno Life at the border Today’s article is not going to be about cowboy movies, nor about the Limes of the Roman Empire, nor about Radio Futura’s song even though it may seem like...
Paloma, Recuero de los Santos Green data centers: fighting climate pollution from Internet use Do you have any idea how the Internet affects the environment? According to World Bank data, 48.5% of the world’s population was already connected to the Internet in 2017...
Telefónica Tech Cyber Security Weekly Briefing 12-18 February Researchers develop exploit for critical vulnerability in Magento Positive Technologies’ offensive security team has developed a Proof of Concept (PoC) for the CVE-2022-24086 CVSSv3 9.8 vulnerability, claiming that it would allow control...
Diego Samuel Espitia A practical approach to integrating MITRE’s ATT&CK and D3FEND Businesses have become aware of the need to have mechanisms in place to ensure the protection of their information and how important it is to understand their weaknesses in...
Telefónica Tech Cyber Security Weekly Briefing 5 – 11 February Microsoft disables macros and MSIX to prevent malware distribution Microsoft has been actively mobilising against multiple malware attacks that use some of its technologies as an entry vector. The products...
Alexandre Maravilla Digital Identity Wallets against identity theft fraud Identity theft or impersonation is a type of fraud in which criminals manage to supplant the identity of the person being deceived, based on the theft of their personal...
Florence Broderick New tool: Maltego transforms for Tacyt If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick Eleven Paths Talks: WordPress in Paranoid Mode ¡Regístrate aquí! El próximo Jueves 30 de Junio nuestro compañero Pablo González impartirá una charla en la que se verá una prueba de concepto realizada en Eleven Paths. Pablo está en...
Florence Broderick ElevenPaths Talks: The ISF Standard of Good Practice for Information Security REGISTER HERE! On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick Mobile Connect winner of the 'Connected Life Awards' Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick Introducing Mobile Connect – the new standard in digital authentication The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...