Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • What is the difference between M2M and IoT? The Smart mining revolution
  • Big Data
    • What does Big Data tell us about the way people move around Brazil’s favelas? How the workers travel to Distrito T?
  • Cybersecurity
    • New tool: Neto, our Firefox, Chrome and Opera extensions analysis suite Adversarial Attacks: The Enemy of Artificial Intelligence

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Cyber Security White House
      Sergio de los Santos

      And the President Said, “Enough Is Enough”. The New Cyber Security Proposals from The White House

      Joe Biden has signed an Executive Order to improve national cyber security and protect federal government networks more efficiently. The attack on oil pipeline operator Colonial Pipeline, a story...
      26 Reasons Why Chrome Does Not Trust the Spanish CA Camerfirma
      Sergio de los Santos

      26 Reasons Why Chrome Does Not Trust the Spanish CA Camerfirma

      From the imminent version 90, Chrome will show a certificate error when a user tries to access any website with a certificate signed by Camerfirma. Perhaps it is not...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • DIARIO Already Detects "Stomped" Macros, But What Are They Exactly?
      Innovation and Laboratory Area in ElevenPaths

      DIARIO Already Detects “Stomped” Macros, But What Are They Exactly?

      Few weeks ago, we presented DIARIO, the malware detector that respects the privacy of users, and we continue to improve it so that it detects more and better. We...
      Cybersecurity Weekly Briefing November 21-27
      ElevenPaths

      Cybersecurity Weekly Briefing November 21-27

      Qbot as a prelude to Egregor ransomware infections Researchers at Group-IB security company have issued a statement claiming to have found activity linking the Qbot banking trojan (also known as...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Introducing the New ElevenPaths Chief Security Envoys (CSEs) for 2020
      ElevenPaths

      Introducing the New ElevenPaths Chief Security Envoys (CSEs) for 2020

      For several years now, in ElevenPaths there is a CSAs (Chief Security Ambassadors) figure. These are experts in cybersecurity, ambassadors of our brand around the world whose mission is to promote the culture of security...
      Cyber Security Weekly Briefing 28 August-3 September
      Telefónica Tech

      Cyber Security Weekly Briefing 28 August – 3 September

      PoC available and scans detected for RCE in Confluence On Wednesday 25 August, Confluence published a security advisory to warn of a vulnerability in Confluence Server and Data Center in versions prior...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Photo: Icons8 Team / Unsplash
Telefónica Tech

Attacking login credentials

An access credential is basically a username and password associated with a person and the access permissions granted to that person for an application, service or system. An access...
Report cyber
Telefónica Tech

Cyber Security Weekly Briefing, 13 – 17 June

​​​Hertzbleed. New side-channel attack on AMD and Intel processors Security researchers at several US universities have discovered a new side-channel attack affecting Intel and AMD processors, called Hertzbleed. What is remarkable...
Nacho Palou

We have a brand-new website! Get to know the new Telefónica Tech Cyber Security & Cloud website

Telefónica Tech is constantly growing and working to be the technological partner of companies in their digital transformation process. As part of this purpose, Telefónica Tech Cyber Security & Cloud...
Photo: RSA Conference 2022
Alberto Sempere

XDR, the cybersecurity trend that dominated the RSA Conference 2022

After a two-year break, I am back at the RSA Conference in San Francisco, the international key event for the cybersecurity industry. Having overcome the typical hurdles of a trip...
Photo: Rhett Lewis / Unsplash
Roberto García Esteban

Cloud Computing, the great ally for the digitalisation of the sports sector (and for athletes)

Data analytics has become fundamental to sport. Gone are the days of coaches and trainers taking notes with their pen in a notebook during matches or training sessions. Everything from...
Photo: Christin Hume / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 6 – 10 June

LockBit threatens Mandiant after linking them to Evil Corp The LockBit 2.0 ransomware group announced on its dark web publishing page afternoon, 6 May, the alleged compromise of cybersecurity firm...
Photo: Christina / Wocintech / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 28 May – 3 June

Rapid evolution of the EnemyBot botnet Since its discovery last March by Securonix researchers, the botnet known as EnemyBot, focused on carrying out DDoS attacks, has continued to expand, thanks...
Projected code over a woman
Cristina del Carmen Arroyo Siruela

Differences between encryption, hashing, encoding and obfuscation

There is currently a lot of confusion about the terms encryption, encoding, cryptography, hashing and obfuscation techniques. These terms are related to computer security, specifically to the confidentiality and...
Woman working with computers / Photo: Mimi Thian / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 21–27 May

​​Unpatched vulnerability in PayPal Security researcher H4x0r-DZ has disclosed an unpatched vulnerability in PayPal’s money transfer service that could allow attackers to trick victims into stealing money by completing targeted...
Photo: ThisIsEngineering / Unsplash
Diego Samuel Espitia

Vulnerabilities, threats and cyber-attacks on industrial systems

Cybercriminals have increasingly targeted industrial environments

Navegación de entradas

Previous articles
1 … 13 14 15 … 64
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Telefónica WannaCry File Restorer: How can we recover information deleted by WannaCry?
When cyberattacks occur in large organizations, it is crucial to remember where duplicate files are stored, as this information is also subject to infection by a malware virus or...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration