Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Most read content in 2021 Fashion connected: the IoT revolution in the textile sector
  • Big Data
    • Commuter Traffic: Can Big Data solve the problem? Macro data, macro responsibility
  • Cybersecurity
    • Cyber Security Weekly Briefing, 18 – 24 March Dumpster diving in Bin Laden’s computers: malware, passwords, warez and metadata (II)

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths

      Securing a Cloud Environment With a Telco Cloud Provider

      Nowadays, nobody can deny the remarkable benefits of cloud computing, both infrastructure as a service (IaaS) and software as a service (SaaS). Cloud computing drives cost savings, agility to...
      Gonzalo Álvarez Marañón

      Post-Quantum Future Is Around the Corner and We Are Still Not Prepared

      Every year we have more powerful computers with a higher calculation capacity, is that fact good or bad? Think twice before giving an answer.  It depends. Because if global information...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Photo: Ed Hardie / Unsplash
      Aarón Jornet

      How Lokibot, the malware used by Machete to steal information and login credentials, works

      Machete is a group dedicated to information theft and espionage. It uses various tools, including LokiBot.
      Cyber Security Weekly Briefing February 13-19
      ElevenPaths

      Cyber Security Weekly Briefing February 13-19

      ​​Privilege escalation vulnerability in Windows Defender SentinelLabs researcher Kasif Dekel has discovered a new vulnerability in Windows Defender that could have been active for more than twelve years. The flaw,...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ransomware
      Martiniano Mallavibarrena

      Understanding The Dynamics of Ransomware Security Incidents

      The ransomware phenomenon If there is one term that has earned its way to the top of the headlines in the media over the last two years, ransomware is undoubtedly...
      Cyber Security Weekly Briefing January 16-22
      ElevenPaths

      Cyber Security Weekly Briefing January 16-22

      SolarWinds Update New details have been released about the software supply chain compromise unveiled in December. FireEye researchers have published an analysis that puts the focus on the threat actor called...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Telefónica Tech

Cyber Security Weekly Briefing, 19 – 23 June

Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
Marina Domínguez

Enlightened despotism vs NASA engineers: The origin of remote work, Geosocial Networks and tips for returning to the office

⏰ Monday 06:00 a.m. Alarm clock goes off. Time to get back to the office after the weekend.  This pre-pandemic habit that most of us workers had so internalised returns...
Telefónica Tech

Meet #LadyHacker Karla Parra, Cybersecurity expert at Telefónica Tech

Our series of interviews with #WomenHackers from Telefónica Tech continues. The purpose of this is to get to know a little better the experts who, with their knowledge and...
Telefónica Tech

Cyber Security Weekly Briefing, 12 – 16 June

Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
Telefónica Tech

Our participation in DES 2023, the leading event on trends and digitalization

The Digital Enterprise Show 2023 (DES) has come to an end after one of the most exciting and intense weeks of the year. As we say goodbye to Málaga,...
AI of Things

Cloud AI vs. Edge AI: know their differences and choose the right approach for your AI project

Learn about the differences between Edge AI and Cloud AI, advantages and disadvantages, and choose the right approach for your Artificial Intelligence project.
Travelers waiting at the airport to onboard
Martiniano Mallavibarrena

‘Insiders’ in Cybersecurity: “Catch me if you can”

Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
Telefónica Tech

Cyber Security Weekly Briefing, 5 – 9 June

Barracuda warns of immediate replacement of compromised ESG appliances Security firm Barracuda has issued a warning in which it is urging organisations affected by the 0-day vulnerability (CVE-2023-2868) in their...
Nacho Palou

Typosquatting: how to detect and protect yourself

It's not always easy to detect and protect yourself from typosquatting. These recommendations from our experts help you reduce risk.
Nacho Palou

The power of sustainable digitalization in the fight against climate change

Climate change is considered the greatest challenge of our time. Its effects range from desertification and droughts to floods and rising sea levels. Some of its most visible consequences...

Navegación de entradas

Volver a portada
1 2 … 64
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration