Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Have you ever wondered where the energy comes from? MWC21: 5G and digital technologies, a reality for the post-covid recovery
  • Big Data
    • Success Story: pioneering project for economic and social development Poverty Insights in Guatemala using Big Data
  • Cybersecurity
    • The Telco Security Alliance Bolsters Threat Detection Capabilities Through Shared Intelligence Meet #LadyHacker Karla Parra, Cybersecurity expert at Telefónica Tech

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cybersecurity Weekly Briefing 26 September - 2 October
      ElevenPaths

      Cybersecurity Weekly Briefing 26 September – 2 October

      The logistics giant CMA CGM affected by a cyber attack This week, the French logistics group CMA CGM, which operates in 160 different countries, reported via its website and social...
      ZoomEye: Extending TheTHE With More Plugins
      Carlos Ávila

      ZoomEye: Extending TheTHE With More Plugins

      Those who follow the developments carried out by the Innovation and Laboratory team will be familiar with our theTHE platform, which specialises in Threat Hunting, IoC analysis and is...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • How to forecast the future and reduce uncertainty thanks to Bayesian inference (I)
      ElevenPaths

      How to forecast the future and reduce uncertainty thanks to Bayesian inference (I)

      Imagine that you come back home from San Francisco, just arrived from the RSA Conference. You are unpacking your suitcase, open the drawer where you store your underwear and…...
      ElevenPaths

      #CyberSecurityPulse: Google’s project to fight election attacks

      On the night of the primary elections in May, the residents from the county Knox, Tennessee, did not know who had won for about an hour. They did not...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ElevenPaths

      Innovation and New Cybersecurity Tools: Security Innovation Days 2020 (Day 3)

      This was the 8th edition of the Security Innovation Days 2020 so far. Three intense days in which innovation in cybersecurity and the digital transformation have been the essence...
      ElevenPaths-RSAConference
      ElevenPaths

      Cybersecurity and Business: ElevenPaths at the RSA Conference 2020

      We are back from the RSA Conference 2020, the year when the standard ‘humanization of technology’ has been set within the sector. We already predicted it last year with our commitment under...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Photo: Icons8 Team / Unsplash
Telefónica Tech

Attacking login credentials

An access credential is basically a username and password associated with a person and the access permissions granted to that person for an application, service or system. An access...
Report cyber
Telefónica Tech

Cyber Security Weekly Briefing, 13 – 17 June

​​​Hertzbleed. New side-channel attack on AMD and Intel processors Security researchers at several US universities have discovered a new side-channel attack affecting Intel and AMD processors, called Hertzbleed. What is remarkable...
Nacho Palou

We have a brand-new website! Get to know the new Telefónica Tech Cyber Security & Cloud website

Telefónica Tech is constantly growing and working to be the technological partner of companies in their digital transformation process. As part of this purpose, Telefónica Tech Cyber Security & Cloud...
Photo: RSA Conference 2022
Alberto Sempere

XDR, the cybersecurity trend that dominated the RSA Conference 2022

After a two-year break, I am back at the RSA Conference in San Francisco, the international key event for the cybersecurity industry. Having overcome the typical hurdles of a trip...
Photo: Rhett Lewis / Unsplash
Roberto García Esteban

Cloud Computing, the great ally for the digitalisation of the sports sector (and for athletes)

Data analytics has become fundamental to sport. Gone are the days of coaches and trainers taking notes with their pen in a notebook during matches or training sessions. Everything from...
Photo: Christin Hume / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 6 – 10 June

LockBit threatens Mandiant after linking them to Evil Corp The LockBit 2.0 ransomware group announced on its dark web publishing page afternoon, 6 May, the alleged compromise of cybersecurity firm...
Photo: Christina / Wocintech / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 28 May – 3 June

Rapid evolution of the EnemyBot botnet Since its discovery last March by Securonix researchers, the botnet known as EnemyBot, focused on carrying out DDoS attacks, has continued to expand, thanks...
Projected code over a woman
Cristina del Carmen Arroyo Siruela

Differences between encryption, hashing, encoding and obfuscation

There is currently a lot of confusion about the terms encryption, encoding, cryptography, hashing and obfuscation techniques. These terms are related to computer security, specifically to the confidentiality and...
Woman working with computers / Photo: Mimi Thian / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 21–27 May

​​Unpatched vulnerability in PayPal Security researcher H4x0r-DZ has disclosed an unpatched vulnerability in PayPal’s money transfer service that could allow attackers to trick victims into stealing money by completing targeted...
Photo: ThisIsEngineering / Unsplash
Diego Samuel Espitia

Vulnerabilities, threats and cyber-attacks on industrial systems

Cybercriminals have increasingly targeted industrial environments

Navegación de entradas

Previous articles
1 … 13 14 15 … 64
More articles
  • Telefónica Tech

Popular

Florence Broderick
New tool: Maltego transforms for Tacyt
If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration