Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • World Environment Day: Green digital transformation as a lever for change Make your holidays run smoothly with IoT
  • Big Data
    • Designing an OOH advertising map in Brazil Data Science – Helping consumers to save money and travel for less
  • Cybersecurity
    • Ripple20: Internet Broken Down Again Trend Report: Hacktivist CyberThreats Report 2019

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
      Cyber Security Weekly Briefing April 24-30 2021
      ElevenPaths

      Cyber Security Weekly Briefing April 24-30

      BadAlloc – Critical Vulnerabilities in Industrial IoT and OT Devices Microsoft security researchers have discovered 25 critical remote code execution (RCE) vulnerabilities, collectively referred to as BadAlloc, affecting a wide...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Telefónica Tech

      Cyber Security Weekly Briefing, 18 – 24 February

      Fortinet fixes critical vulnerabilities in FortiNAC and FortiWeb Fortinet has issued a security advisory fixing two critical vulnerabilities affecting its FortiNAC and FortiWeb products. The security flaws have been registered...
      CARMA: Our Free Research-Focused Set of Android Malware Samples
      Innovation and Laboratory Area in ElevenPaths

      CARMA: Our Free Research-Focused Set of Android Malware Samples

      Introducing CARMA, our free research-focused set of Android malware samples to enhance research into malware, adware and PUP detection.
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Zoom Seeks to Be More Secure and Purchases Keybase
      Gonzalo Álvarez Marañón

      Zoom Seeks to Be More Secure and Purchases Keybase

      The most downloaded video call app during the quarantine responds to criticism for its serious security and privacy issues.
      Telefónica Tech

      Cyber Security Weekly Briefing 5 – 11 February

      Microsoft disables macros and MSIX to prevent malware distribution Microsoft has been actively mobilising against multiple malware attacks that use some of its technologies as an entry vector. The products...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Nacho Palou

Google’s Passkey is just another nail in the password coffin

Google’s Passkey offers users the possibility of using an access key to identify themselves on websites or apps without typing their username and password. Google explains that the passkeys replace...
Telefónica Tech

Cyber Security Weekly Briefing, 6 – 12 May

Security updates vulnerabilities in Fortinet products Fortinet has announced a set of security updates that fix up to a total of 9 vulnerabilities, 2 of which are considered high severity...
Sergio de los Santos

Pay When You Get Infected by Ransomware? Many Shades of Grey

The Internet is full of articles explaining why ransomware should not be paid. And they are probably right, but if you don’t make a difference between the type of ransomware and...
Telefónica Tech

Cyber Security Weekly Briefing, 29 April – 5 May

Critical vulnerability in Zyxel firewalls Network equipment manufacturer Zyxel has released security patches for a critical vulnerability affecting its firewalls. The vulnerability, which was discovered and reported by the TRAPA...
David García

Will Rust save the world? (I)

How Rust, the security-focused open source programming language, improves the outlook for memory error-based vulnerabilities
Marina Domínguez

The three revolutions of the Contact Center: apple pies, convertibles, and social media

Every business relationship begins with a “match”. Since the foundation of any business, no matter how small it may be, one of its main objectives is to make itself...
Telefónica Tech

Cyber Security Weekly Briefing, 22 – 28 April

SolarWinds fixes high severity vulnerabilities In its latest security update, SolarWinds has fixed a total of 2 high-severity vulnerabilities, which could lead to command execution and privilege escalation. The more...
Jorge Rubio

Artificial Intelligence applied to industrial Cyber Security (OT)

Cyber Security in industrial or OT (Operational Technology) environments is crucial to protect critical infrastructures such as energy, transport and communication and has become an increasing concern as they...
Telefónica Tech

Cyber Security Weekly Briefing, 15 – 21 April

Google fixes two new actively exploited 0-day vulnerabilities Google has issued new security advisories on the identification of 0-day vulnerabilities affecting the Chrome browser that are being actively exploited. The...
Nacho Palou

Industrial digitalization: we share the keys at Advanced Factories

This week we are at Advanced Factories, the annual reference meeting on innovation and industrial automation, robotics, and digitalized industry or Industry 4.0. At Telfónica Tech, we are sharing our...

Navegación de entradas

Previous articles
1 2 3 4 … 64
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
ElevenPaths
ElevenPaths creates an addon to make Firefox compatible with Certificate Transparency
Certificate Transparency will be mandatory in Chrome for new certificates in late 2017. This means that the webpages will show an alert if protected by certificates not present in...
Florence Broderick
Now you can use Latch with Dropbox, Facebook and others digital services
Many of you have asked us which services you can use Latch with, regretting that so far it could not be used in the more common services, such as...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Heartbleed plugin for FOCA
By now, everyone knows about Heartbleed. Just like we did for FaasT, we have created a plugin for FOCA (final version) one of our most downloaded tools. This plugin...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration