Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Smart stores, the future of Retail AI of Things (XI) Preventive maintenance on sensors: anticipating sensor failures, predicting battery replacement
  • Big Data
    • Deep Learning vs Atari: train your AI to dominate classic videogames (Part II) Poverty Insights in Guatemala using Big Data
  • Cybersecurity
    • Cyber Security Weekly Briefing, 27 August — 2 September #CyberSecurityReport21H1: More than 246 million OT cyber security events detected in six months

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cyber Security White House
      Sergio de los Santos

      And the President Said, “Enough Is Enough”. The New Cyber Security Proposals from The White House

      Joe Biden has signed an Executive Order to improve national cyber security and protect federal government networks more efficiently. The attack on oil pipeline operator Colonial Pipeline, a story...
      Cybersecurity for industrial digitalisation: keys to a successful approach
      ElevenPaths

      Cybersecurity for Industrial Digitalisation: Keys to a Successful Approach

      Digital technologies, and in particular what has been agreed to be called IoT (Internet of Things), bring a world of possibilities that organisations of any sector cannot fail to...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • More and shorter certificates with a lower lifetime: where is TLS going to?
      Sergio de los Santos

      More and Shorter Certificates with a Lower Lifetime: Where Is TLS Going to?

      Cryptography is undergoing a renewal of all that is established. Know about all the events that are transforming the way the web works in this article.
      ElevenPaths

      #CyberSecurityPulse: Tell me your social networks and you will be welcome in the United States (or maybe not)

      The US Department of State wants to ask visa applicants to provide details of their social networks which they have used within the last five years, as well as...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Do I Really Need an Antivirus?
      ElevenPaths

      Do I Really Need an Antivirus?

      How can standard users protect themselves? In this article we explain what an antivirus is for and how you can be (more) protected.
      Photo: Anthony Riera / Unsplash
      Telefónica Tech

      Cyber Security Weekly Briefing, 5 – 11 November

      Robin Banks Phishing Platform Reactivated Researchers at IronNet have published the second part of their investigation into the Robin Banks phishing-as-a-service platform. The platform was discovered in June this year...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Photo: Thought Catalog / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 24 — 30 September

Two 0-day vulnerabilities exploited in Microsoft Exchange The Vietnamese cybersecurity team GTSC reported two 0-day vulnerabilities in Microsoft Exchange three weeks ago through the Zero Day Initiative (ZDI) that are...
Photo: Linkedin Sales Solutions / Unsplash
Marta Mallavibarrena

Human factor key in cyber security

Dozens of vulnerabilities are discovered every day in the current landscape (an average of 50 in 2021), and attackers are finding new and ingenious ways to exploit them. It...
Photo: Christina Wocintechchat.com
ElevenPaths

Cyber Security Weekly Briefing, 17 — 23 September

Quantum and BlackCat ransomware use Emotet as entry vector Researchers at AdvIntel have published the results of an investigation reporting that ransomware operators Quantum and BlackCat have adopted the use...
Photo: Denys Nevozhai / Unsplash
Emilio Moreno

Latency and Edge Computing: Why is it important?

For many years we have been in a race to increase the speed of our connections. Ever since those modems that treated us to a symphony of beeps, the...
Foto: Kelly Sikkema / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 9 — 16 September

Microsoft fixes two 0-day and 63 other vulnerabilities in Patch Tuesday Microsoft has fixed 63 vulnerabilities in its September Patch Tuesday, including two 0-days, one of them actively exploited, and...
Photo: Hugo Jehanne / Unsplash
Estevenson Solano

How to become a cyber resilient organisation

Fear, panic and uncertainty are some of the feelings constantly experienced in corporate leadership. In management committees, the big question is frequently asked: is our cyber security working? As...
Photo: Dan Gold / Unsplash
Marta Mª Padilla Foubelo

Name the malware you have, and I’ll tell you which botnet you belong to

What is a botnet and how does it work? To begin with, let’s dissociate the word botnet. On the one hand, “bot” means robot and, on the other hand, “net”...
Roberto García Esteban

Cloud market trends until 2025

All of us who work in Cloud services are aware that this market is still in a phase of accelerated growth and that more and more companies are taking...
Photo: Joseph Frank / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 3 — 9 September

0-day vulnerability in Google Chrome Google released on Friday an emergency patch for the Chrome browser on Windows, Mac and Linux, fixing a 0-day vulnerability, which is being actively exploited. The...
Photo: Parabol / Unsplash
Roberto González Rojo

Collaborative solutions to address the challenge of hybrid working

Microsoft surveyed 30,000 people in 31 different countries in 2021 as part of its Work Trend Index report, asking participants for their opinion on the most appropriate way to...

Navegación de entradas

Previous articles
1 … 10 11 12 … 64
More articles
  • Telefónica Tech

Popular

Florence Broderick
Participating in GSMA Mobile 360 LATIN AMERICA
Mobile 360 – Latin America brings market leaders from Central and South America across the mobile telecom ecosystem for a two-day thought leadership conference together with operator-led Working Groups...
Florence Broderick
Our CEO, Pedro Pablo Pérez, will represent Telefonica in the European Cyber Security Organization
Brussels and the cybersecurity industry will earmark up to 1.8 billion euros in research TELEFONICA JOINS THE DECISION-MAKING BODIES OF THE EUROPEAN CYBER SECURITY ORGANIZATION AS...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Telefónica and ElevenPaths announce new market leading security offering following key sector agreements
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration