Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • We apply quantum technology to real use cases of Blockchain and IoT Architecture, digitalisation, and sustainability as pillars of the transformation of football stadiums
  • Big Data
    • The AI Hunger Games – Why is modern Artificial Intelligence so data hungry? (Part II) Case Study: LUCA Store and DK Management, driving footfall and increasing convertion
  • Cybersecurity
    • Cyber Security Weekly Briefing March 6-12 Disinformation and fake news: what initiatives do exist to combat them?

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Fireless Malware
      Diego Samuel Espitia

      Fileless Malware: A Growing but Controllable Attack

      For some years now, WatchGuard has been generating a report on the security situation detected on the Internet. Following the acquisition of Panda, this report has become even more...
      Move to the cloud with confidence supported by ElevenPaths and Check Point
      Pablo Alarcón Padellano

      Move to the cloud with confidence supported by ElevenPaths and Check Point

      The goal of ElevenPaths Public Cloud Managed Security Services is to help you to secure any cloud workload and to mitigate cloud risks.
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Cómo realizar peticiones API REST a los servicios ocultos de Tor desde un APK de Android
      Rafael Ortiz

      How to Make API REST Requests to Tor Hidden Services in an Android APK

      If you are a developer and want to test your Android app with a Tor hidden service, here's how.
      New TheTHE Version with URLScan and MalwareBazaar Plugins
      Innovation and Laboratory Area in ElevenPaths

      New TheTHE Version with URLScan and MalwareBazaar Plugins

      The first time an IoC lay on your hands. Let’s say it is a hash, URL, IP or a suspicious domain. You need to know some basic information. Is...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Cyber Security Weekly Briefing 14-27 August
      Telefónica Tech

      Cyber Security Weekly Briefing 14-27 August

      Exploitation of vulnerabilities in Exchange ProxyShell​ Security researcher Kevin Beaumont has analyzed the recent massive exploitation of Microsoft Exchange Server vulnerabilities known as ProxyShell. These are a set of flaws revealed by Orange...
      Cyber Security Weekly Briefing 22-28 january
      Telefónica Tech

      Cyber Security Weekly Briefing 22-28 January

      New vulnerabilities in Linux Two new vulnerabilities of risk have recently been disclosed and are reportedly affecting Linux systems. If exploited, they could allow privilege escalation on the vulnerable system. CVE-2021-4034...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Photo: Icons8 Team / Unsplash
Telefónica Tech

Attacking login credentials

An access credential is basically a username and password associated with a person and the access permissions granted to that person for an application, service or system. An access...
Report cyber
Telefónica Tech

Cyber Security Weekly Briefing, 13 – 17 June

​​​Hertzbleed. New side-channel attack on AMD and Intel processors Security researchers at several US universities have discovered a new side-channel attack affecting Intel and AMD processors, called Hertzbleed. What is remarkable...
Nacho Palou

We have a brand-new website! Get to know the new Telefónica Tech Cyber Security & Cloud website

Telefónica Tech is constantly growing and working to be the technological partner of companies in their digital transformation process. As part of this purpose, Telefónica Tech Cyber Security & Cloud...
Photo: RSA Conference 2022
Alberto Sempere

XDR, the cybersecurity trend that dominated the RSA Conference 2022

After a two-year break, I am back at the RSA Conference in San Francisco, the international key event for the cybersecurity industry. Having overcome the typical hurdles of a trip...
Photo: Rhett Lewis / Unsplash
Roberto García Esteban

Cloud Computing, the great ally for the digitalisation of the sports sector (and for athletes)

Data analytics has become fundamental to sport. Gone are the days of coaches and trainers taking notes with their pen in a notebook during matches or training sessions. Everything from...
Photo: Christin Hume / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 6 – 10 June

LockBit threatens Mandiant after linking them to Evil Corp The LockBit 2.0 ransomware group announced on its dark web publishing page afternoon, 6 May, the alleged compromise of cybersecurity firm...
Photo: Christina / Wocintech / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 28 May – 3 June

Rapid evolution of the EnemyBot botnet Since its discovery last March by Securonix researchers, the botnet known as EnemyBot, focused on carrying out DDoS attacks, has continued to expand, thanks...
Projected code over a woman
Cristina del Carmen Arroyo Siruela

Differences between encryption, hashing, encoding and obfuscation

There is currently a lot of confusion about the terms encryption, encoding, cryptography, hashing and obfuscation techniques. These terms are related to computer security, specifically to the confidentiality and...
Woman working with computers / Photo: Mimi Thian / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 21–27 May

​​Unpatched vulnerability in PayPal Security researcher H4x0r-DZ has disclosed an unpatched vulnerability in PayPal’s money transfer service that could allow attackers to trick victims into stealing money by completing targeted...
Photo: ThisIsEngineering / Unsplash
Diego Samuel Espitia

Vulnerabilities, threats and cyber-attacks on industrial systems

Cybercriminals have increasingly targeted industrial environments

Navegación de entradas

Previous articles
1 … 13 14 15 … 64
More articles
  • Telefónica Tech

Popular

Innovation Marketing Team
Empowering women in entrepreneurship: 10 female – led startups in Germany
In Germany, only about 15% of startups are initiated by women. Sadly, the figure has been stagnant for years. Additionally, female-led startups receive significantly less Venture Capital than those...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
ElevenPaths announced its new strategic alliances in the third Security Day
In the third Security Day the new alliance with Fortinet and ElevenPaths’s new product integrations with Check Point and Spamina solutions to evolve their technologies were presented. Madrid, 26th May....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration