Telefónica Tech Cyber Security Weekly Briefing, 19 – 23 June Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
Marina Domínguez Enlightened despotism vs NASA engineers: The origin of remote work, Geosocial Networks and tips for returning to the office ⏰ Monday 06:00 a.m. Alarm clock goes off. Time to get back to the office after the weekend. This pre-pandemic habit that most of us workers had so internalised returns...
Telefónica Tech Meet #LadyHacker Karla Parra, Cybersecurity expert at Telefónica Tech Our series of interviews with #WomenHackers from Telefónica Tech continues. The purpose of this is to get to know a little better the experts who, with their knowledge and...
Telefónica Tech Cyber Security Weekly Briefing, 12 – 16 June Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
Telefónica Tech Our participation in DES 2023, the leading event on trends and digitalization The Digital Enterprise Show 2023 (DES) has come to an end after one of the most exciting and intense weeks of the year. As we say goodbye to Málaga,...
AI of Things Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project Learn about the differences between Edge AI and Cloud AI, advantages and disadvantages, and choose the right approach for your Artificial Intelligence project.
Martiniano Mallavibarrena ‘Insiders’ in Cybersecurity: “Catch me if you can” Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
Telefónica Tech Cyber Security Weekly Briefing, 5 – 9 June Barracuda warns of immediate replacement of compromised ESG appliances Security firm Barracuda has issued a warning in which it is urging organisations affected by the 0-day vulnerability (CVE-2023-2868) in their...
AI of Things These free Google courses will get you started with generative-AI Learn about the concepts and principles of generative AI or how to create and deploy AI solutions: language models, image generation... and also about responsible AI.
Nacho Palou Typosquatting: how to detect and protect yourself It's not always easy to detect and protect yourself from typosquatting. These recommendations from our experts help you reduce risk.
Nacho Palou What is AI-winter and how to avoid it Are we on the verge of the next AI winter? What factors could contribute to it? Fear, restrictive legislation, or lack of progress can impact AI's future.
Nacho Palou The power of sustainable digitalization in the fight against climate change Climate change is considered the greatest challenge of our time. Its effects range from desertification and droughts to floods and rising sea levels. Some of its most visible consequences...
Telefónica Tech Cyber Security Weekly Briefing, 27 May – 2 June Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
Nacho Palou How language puts business Cybersecurity at risk Cybersecurity is crucial for businesses and organizations of all sizes and sectors. Cyberattacks can have severe or even fatal consequences for businesses, such as data loss, operational disruptions, or...
Carlos Rebato Cryptography, a tool for protecting data shared on the network Cyber Security is nowadays an essential element in companies. However, new ways of undermining it are emerging every day. Many have asked themselves: how can companies securely store their...
Roberto García Esteban ChatGPT and Cloud Computing: A happy marriage ChatGPT (you may not know that it stands for Chat Generative Pre-Trained Transformer) has become the talk of the town for its impressive ability to generate text that looks...
Telefónica Tech The importance of access control: is your company protected? By David Prieto and Rodrigo Rojas In an increasingly digitalized and complex world, information security is critical for businesses. As companies adopt more cloud technologies and services or allow access...
ElevenPaths Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry? When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick Evil FOCA is now Open Source We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick The Turkish behind pr0nClicker, uploads badware to Google Play for the fourth time During last week, the Turkish (maybe a gang, maybe just a person) behind the pr0nClickers malware got to avoid Google Play defenses and upload again dozens of fake apps...
Florence Broderick JSDialers: apps calling premium rate numbers (with new techniques) in Google Play During last year, a lot of “made in Spain” malware was found in Google Play. It was basically malware that tried to silently subscribe the victim to premium SMS numbers. From a while...
Florence Broderick The beginning It is widely known that writing the first post is always a difficult task, but it is a compelling one. It’s the start of a new path that you...