Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Interview with Vicente Muñoz Boza, Chief IoT Officer of Telefónica Energy efficiency switches to the Smart side
  • Big Data
    • Big Data, the fuel for Digital Banks Artificial Intelligence of Things, how things plan to make our lives simpler
  • Cybersecurity
    • Rock appround the clock, our research in DEFCON #LadyHacker 2021, IT’S HERE!

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • DIARIO
      Andrés Naranjo

      DIARIO: One More Weapon in Thehive’s Arsenal

      We already know that the weakest link in the cyber security chain is the user. Studies show that the main reason why a cyber-attack on a company is successful...
      ElevenPaths

      #CyberSecurityPulse: Google’s project to fight election attacks

      On the night of the primary elections in May, the residents from the county Knox, Tennessee, did not know who had won for about an hour. They did not...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • ElevenPaths

      Rock appround the clock, our research in DEFCON

      In the world of Threat Intelligence, determining the attacker’s geographical location of is one of the most valuable data for attribution techniques, even if not perceived like that, this...
      Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later
      Gonzalo Álvarez Marañón

      Rock, Paper, Scissors and Other Ways to Commit Now and Reveal Later

      Have you ever played rock, paper, scissors? I bet you have. Well, let’s put the tin lid on it: how would you play through the phone? One thing is...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Plausibly Deniable Encryption or How to Reveal A Key Without Revealing It
      Gonzalo Álvarez Marañón

      Plausibly Deniable Encryption or How to Reveal A Key Without Revealing It

      When the secret police arrested Andrea at the airport checkpoint, she thought it was a mere formality reserved for all foreign citizens. When they searched her luggage and found...
      Photo: Jenny Ueberberg / Unsplash
      Mark Skelton

      The Formula for Successful Hybrid Working

      Optimising cloud-based technologies and enabling a seamless blend between remote and office work will be the key to hybrid working success. To achieve this, any effective hybrid working formula...
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Telefónica Tech

Cyber Security Weekly Briefing, 21 – 27 January

Killnet targeting victims in Spain This week, the hacktivist group Killnet announced a campaign of attacks against Germany, leading to Distributed Denial of Service (DDoS) attacks that rendered the websites...
Marta Nieto Gómez-Elegido

«We are moving towards genderless professions», María Martínez

It’s a cold morning in Madrid and María Martínez Martín, Head of the Threats Intelligence Operations team at Telefónica Tech, welcomes us at the Telefónica building. Wearing a blue blazer...
Gonzalo Fernández Rodríguez

What is a Cloud-Native Application?

The term Cloud Native is something that goes beyond moving applications on-premises, i.e. hosted directly in a data centre to an infrastructure from a Cloud provider, whether public or...
Telefónica Tech

Cyber Security Weekly Briefing, 14 – 20 January

Critical vulnerabilities in Netcomm and TP-Link routers Several vulnerabilities have been discovered in Netcomm and TP-Link routers. On the one hand, the flaws, identified asCVE-2022-4873 and CVE-2022-4874, are a case of buffer...
Jorge Rubio

Consequences of a cyber-attack in industrial environments

Industrial environments can be found in any type of sector we can imagine, whether in water treatment, transport, pharmaceutical, machinery manufacturing, electrical, food or automotive companies, among others. The differences...
Telefónica Tech

Cyber Security Weekly Briefing, 7 – 13 January

​Microsoft fixes 98 vulnerabilities on Patch Tuesday​ Microsoft has published its security bulletin for the month of January, in which it fixes a total of 98 vulnerabilities. Among these, an...
Daniel Pous Montardit

Observability: what it is and what it offers

What is observability? The term “observability” comes from Rudolf Kalman’s control theory and refers to the ability to infer the internal state of a system based on its external outputs....
Telefónica Tech

Cyber Security Weekly Briefing, 31 December – 6 January

PyTorch’s dependency chain is breached PyTorch, a popular open-source machine learning framework, has warned users who installed PyTorch-nightly between 25 and 30 December 2022 to uninstall the framework and the...
ransomware
Martiniano Mallavibarrena

Understanding The Dynamics of Ransomware Security Incidents

The ransomware phenomenon If there is one term that has earned its way to the top of the headlines in the media over the last two years, ransomware is undoubtedly...
Alexandre Maravilla

Web3 and the evolution of Internet Identity

The recent rise of Web3; the new evolution of the Internet to make it decentralised through Blockchain, is also bringing a lot of talk about decentralised identity schemes and...

Navegación de entradas

Previous articles
1 … 6 7 8 … 64
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
New tool: PinPatrol for Chrome. Something more than a plugin, a forensics tool
Back in July, we created a new tool for improving the experience using HSTS and HPKP in Firefox. Now it’s time for Chrome. It shows this information in a...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration