Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • The increasing importance of Big Data in eCommerce Deep Learning and satellite images to estimate the impact of COVID19
  • Big Data
    • 7 Big Data events in May What is AI-winter and how to avoid it
  • Cybersecurity
    • Cybersecurity Weekly Briefing 29 August-4 September Cyber Security Weekly Briefing, 6 – 10 June

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Nacho Palou

      How language puts business Cybersecurity at risk

      Cybersecurity is crucial for businesses and organizations of all sizes and sectors. Cyberattacks can have severe or even fatal consequences for businesses, such as data loss, operational disruptions, or...
      New Capabilities for the Future of Cybersecurity: Security Innovation Days (Day 2)
      ElevenPaths

      New Capabilities for the Future of Cybersecurity: Security Innovation Days 2020 (Day 2)

      Second day of the Security Innovation Days 2020, focusing on the new capabilities we have acquired as a cybersecurity company from Telefónica Tech. A few weeks ago, we announced...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Cybersecurity Weekly Briefing 29 August-4 September
      ElevenPaths

      Cybersecurity Weekly Briefing 29 August-4 September

      Red Dawn, new attached document from Emotet The use of a new attached document template by Emotet has been identified over the past week. The name given by security researcher Joseph...
      Cybersecurity Weekly Briefing September 19-25
      ElevenPaths

      Cybersecurity Weekly Briefing September 19-25

      New attack vector for vulnerability in Citrix Workspace Pen Test Partners security researcher Ceri Coburn has discovered a new attack vector for the CVE-2020-8207 vulnerability in Citrix Workspace corrected in...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Encryption That Preserves The Format To Ensure The Privacy Of Financial And Personal Data
      Gonzalo Álvarez Marañón

      Encryption That Preserves The Format To Ensure The Privacy Of Financial And Personal Data

      Your personal information swarms through thousands of databases of public and private organizations. How do you protect its confidentiality so that it does not fall into the wrong hands?...
      4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools
      Innovation and Laboratory Area in ElevenPaths

      4th Anniversary of No More Ransom: ElevenPaths, Partner Entity with Two Tools

      Discover the tools we contribute to this important initiative launched by Europol to help ransomware victims.
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Telefónica Tech

Cyber Security Weekly Briefing, 21 – 27 January

Killnet targeting victims in Spain This week, the hacktivist group Killnet announced a campaign of attacks against Germany, leading to Distributed Denial of Service (DDoS) attacks that rendered the websites...
Marta Nieto Gómez-Elegido

«We are moving towards genderless professions», María Martínez

It’s a cold morning in Madrid and María Martínez Martín, Head of the Threats Intelligence Operations team at Telefónica Tech, welcomes us at the Telefónica building. Wearing a blue blazer...
Gonzalo Fernández Rodríguez

What is a Cloud-Native Application?

The term Cloud Native is something that goes beyond moving applications on-premises, i.e. hosted directly in a data centre to an infrastructure from a Cloud provider, whether public or...
Telefónica Tech

Cyber Security Weekly Briefing, 14 – 20 January

Critical vulnerabilities in Netcomm and TP-Link routers Several vulnerabilities have been discovered in Netcomm and TP-Link routers. On the one hand, the flaws, identified asCVE-2022-4873 and CVE-2022-4874, are a case of buffer...
Jorge Rubio

Consequences of a cyber-attack in industrial environments

Industrial environments can be found in any type of sector we can imagine, whether in water treatment, transport, pharmaceutical, machinery manufacturing, electrical, food or automotive companies, among others. The differences...
Telefónica Tech

Cyber Security Weekly Briefing, 7 – 13 January

​Microsoft fixes 98 vulnerabilities on Patch Tuesday​ Microsoft has published its security bulletin for the month of January, in which it fixes a total of 98 vulnerabilities. Among these, an...
Daniel Pous Montardit

Observability: what it is and what it offers

What is observability? The term “observability” comes from Rudolf Kalman’s control theory and refers to the ability to infer the internal state of a system based on its external outputs....
Telefónica Tech

Cyber Security Weekly Briefing, 31 December – 6 January

PyTorch’s dependency chain is breached PyTorch, a popular open-source machine learning framework, has warned users who installed PyTorch-nightly between 25 and 30 December 2022 to uninstall the framework and the...
ransomware
Martiniano Mallavibarrena

Understanding The Dynamics of Ransomware Security Incidents

The ransomware phenomenon If there is one term that has earned its way to the top of the headlines in the media over the last two years, ransomware is undoubtedly...
Alexandre Maravilla

Web3 and the evolution of Internet Identity

The recent rise of Web3; the new evolution of the Internet to make it decentralised through Blockchain, is also bringing a lot of talk about decentralised identity schemes and...

Navegación de entradas

Previous articles
1 … 6 7 8 … 64
More articles
  • Telefónica Tech

Popular

ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration