Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The benefits of energy efficiency: Much more than savings IoT, the new ally of renewable energies?
  • Big Data
    • 7 Big Data and AI predictions for 2018 LUCA boosts brand engagement with “Sponsored Data” product
  • Cybersecurity
    • Cyber Security Weekly Briefing, 4 – 10 February Cyber Security in Times of Pandemic: How Has Confinement Affected Our Digital Security?

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Securing your Cloud Native Applications in AWS in the New Normal
      Pablo Alarcón Padellano

      Securing your Cloud Native Applications in AWS in the New Normal

      The New Cloud Adoption Reality Yes, we are facing a New Normal, and we are living a new cloud adoption reality as well. Enterprise cloud adoption accelerates in face of...
      Cybersecurity Weekly Briefing July 11-17
      ElevenPaths

      Cybersecurity Weekly Briefing July 11-17

      Combining Citrix vulnerabilities to steal user sessions On July 7th, Citrix published a security bulletin to correct up to 11 vulnerabilities. A few days later, a report was released with...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)
      Sergio de los Santos

      A Simple Explanation About SAD DNS and Why It Is a Disaster (or a Blessing)

      In 2008, Kaminsky shook the foundations of the Internet. A design flaw in the DNS made it possible to fake responses and send a victim wherever the attacker wanted....
      Cyber Security Weekly Briefing January 16-22
      ElevenPaths

      Cyber Security Weekly Briefing January 16-22

      SolarWinds Update New details have been released about the software supply chain compromise unveiled in December. FireEye researchers have published an analysis that puts the focus on the threat actor called...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • ElevenPaths

      You’ve got mail? You’ve got malware

      A few weeks ago I was ‘compromised’. A well-known vulnerability was exploited and I was left financially exposed, with my reputation potentially at risk. “What happened?” I hear you...
      What differential privacy is and why Google and Apple are using it with your data
      Gonzalo Álvarez Marañón

      What Differential Privacy Is and Why Google and Apple Are Using It with Your Data

      Differential privacy allows you to know your users without compromising their privacy, but achieving it is a complex process. Here's why.
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Photo: Matthew Henry / Unsplash
Telefónica Tech

How does a hybrid cloud work?

When it comes to digitalisation and starting the “journey” to the cloud, most companies choose multi-cloud solutions or hybrid clouds as the main technology for safeguarding their databases and...
Telefónica Tech

Cyber Security Weekly Briefing, 18 – 25 November

Exploit for ProxyNotShell vulnerabilities published The first publications about new critical vulnerabilities in Microsoft Exchange Server, CVE-2022-41040 and CVE-2022-41082, which were named ProxyNotShell, were published at the end of September. However,...
Telefónica Tech

Cyber Security Weekly Briefing, 11 – 18 November

Security updates for 35 Cisco vulnerabilities Cisco has released a security update that addresses 35 vulnerabilities in Cisco Adaptive Security Appliance (ASA), Firepower Threat Defense (FTD) and Firepower Management Center...
José Pedro Gómez

A matter of trust: The need for governance and control of a project

Why do I need management figures for the governance of my project? Back in the 13th century, a philosopher once said that an arrow has all the power in itself...
Photo: Berkeley Communications / Unsplash
César Cañada Alonso

Zero trust, a trend in the cyber security environment

Nowadays, the attack surface is larger than before, as there are now more applications, servers, users, etc. in companies. For this reason, it is necessary to limit access, granting...
Photo: Anthony Riera / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 5 – 11 November

Robin Banks Phishing Platform Reactivated Researchers at IronNet have published the second part of their investigation into the Robin Banks phishing-as-a-service platform. The platform was discovered in June this year...
Daniel Sandmeier

Disinformation and fake news: what initiatives do exist to combat them?

The phenomenon of disinformation has been causing concern in European societies, including Spain, for several years now. The I Study on disinformation in Spanish society reveals revealing data such...
Telefónica Tech

Cyber Security Weekly Briefing, 28 October – 4 November

Vulnerabilities fixed in new OpenSSL version  The new 3.0.7 version of OpenSSL, announced last week by the developers of the project, was made public this past Wednesday. The expectation around this...
Martiniano Mallavibarrena

Attention: Data leak! (In search of lost data)

We have been hearing about “data leaks” on a regular basis for years, both in the media and in our professional or even personal environment. The concept actually covers...
Photo: Jenny Ueberberg / Unsplash
Mark Skelton

The Formula for Successful Hybrid Working

Optimising cloud-based technologies and enabling a seamless blend between remote and office work will be the key to hybrid working success. To achieve this, any effective hybrid working formula...

Navegación de entradas

Previous articles
1 … 8 9 10 … 64
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
ElevenPaths announced its new strategic alliances in the third Security Day
In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented. Madrid, 26th May....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration