Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Artificial Intelligence of Things, how things plan to make our lives simpler The IoT to protect shipments
  • Big Data
    • One day Artificial Intelligence could save your life 5 medical uses of Virtual Reality
  • Cybersecurity
    • Decepticons vs. Covid-19: The Ultimate Battle Cyber Security Weekly Briefing, 25 February – 3 March

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • ElevenPaths

      SealSign integration with the Azure Key Vault

      ElevenPaths and Microsoft, thanks to Gradiant technology, have integrated the Azure Key Vault into the SealSign platform. This partnership provides a server-based digital signature and certificate safekeeping service, based...
      No Pain, No Gain: Let's Hack 2021
      ElevenPaths

      No Pain, No Gain: Let´s Hack 2021

      “No pain, no gain”, you have probably heard this on more than one occasion. An expression that is used endlessly in different environments, in a time when the body...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      #CyberSecurityPulse: Dude, Where Are My Bitcoins?

      Numerous types of attacks are affecting cryptocurrency users: families of malware that steal wallets, phishing attacks that try to forge platforms where users manage their bitcoins, applications that use...
      Telefónica Tech

      Cyber Security Weekly Briefing, 5 – 9 June

      Barracuda warns of immediate replacement of compromised ESG appliances Security firm Barracuda has issued a warning in which it is urging organisations affected by the 0-day vulnerability (CVE-2023-2868) in their...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Marta Mallavibarrena

      Artificial Intelligence, ChatGPT, and Cyber Security

      Artificial Intelligence (AI) has become a frequent topic on this blog. Almost all predictions of technological trends for the coming years include it as one of the key advances. In...
      Telefónica Tech

      Cyber Security Weekly Briefing, 11 – 17 March

      ​​A new version of the Xenomorph banking trojan ThreatFabric researchers have detected a new variant of the Android banking trojan Xenomorph. This malware family was first detected in February 2022...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Photo: Lenny Kuhne / Unsplash
Diego Samuel Espitia

Wireless attacks on OT

Wireless networks are now present in all types of industries. It is undoubtedly one of the most notable changes brought about by smart industry because it has increased productivity...
Photo: Mikayla Mallek / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 27 August — 2 September

Critical vulnerability in Atlassian Bitbucket Server and Data Center Atlassian has recently warned its users about a new critical vulnerability affecting the Bitbucket Server and Data Center software, which shall...
Photo: Persnickety Prints / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 8 — 19 August

Google reports largest DDoS attack in history Google researchers have reported the largest DDoS attack ever recorded. Last 1 June, a Google Cloud Armor client received a series of HTTP...
Top 3 cyber security posts
Telefónica Tech

Top 3 most read cybersecurity posts this year

In our weekly summer compilation with the most relevant and most read contents of the Telefónica Tech blog since the beginning of this year, this time we bring you...
Cyber Security Weekly Briefing august
Telefónica Tech

Cyber Security Weekly Briefing, 30 July – 5 August

Possible link between Raspberry Robin malware and Evil Corp infections The Microsoft Threat Intelligence Center (MSTIC) team has published new information about the Raspberry Robin malware, first detected by the...
Photo: Bruno Gomiero / Unsplash
José Vicente Catalán

You take a holiday, but your cybersecurity doesn’t: 5 tips to protect yourself this summer

Holidays are a necessity, that’s for sure. Everyone needs to relax, to spend quality time with family and friends, to disconnect. But, ironically, in order to disconnect, we end...
Cyber Security Weekly Briefing 29 July
Telefónica Tech

Cyber Security Weekly Briefing, 23-29 July

New Critical Vulnerability in SonicWall Products Researchers from DBappSecurity HAT lab have discovered a critical vulnerability that affects several SonicWall Analytics On-Prem and SonicWall Global Management System products. The vulnerability, a...
Photo: Craig Garner / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 16 — 22 July

Lightning Framework: new malware targeting Linux environments Researchers at Intezer have published information about a new type of malware targeting Linux environments, which they have named Lightning Framework. While the...
Photo: This is Engineering RAEng / Unsplash
Diego Samuel Espitia

What are operational technology (OT) security “Patch Tuesdays”?

In the cybersecurity world we are used to the release of packages that fix vulnerabilities detected in business software. One of the releases that has established a periodicity and...
Photo: 煜翔 肖 / Unsplash
Roberto García Esteban

Cloud Computing still running on holidays

Summer holidays are here and its time for almost all of us to take a well-deserved break. The activity of most companies is drastically reduced, although there are also...

Navegación de entradas

Previous articles
1 … 11 12 13 … 64
More articles
  • Telefónica Tech

Popular

ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
Who are you going to believe, me or your own eyes? The dilemma of managed security
Organizations are facing a context of increasingly complex IT threats jeopardizing the everyday development of production processes. We are referring to persistent advanced attacks, zero-day threats, industrial espionage, hacktivism,...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration