Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • How can we make water consumption more efficient? How to know how smart a Smart City is
  • Big Data
    • Under a week to go until #BDID2017! Data Science – Helping consumers to save money and travel for less
  • Cybersecurity
    • Cybersecurity Weekly Briefing July 25-31 Cybersecurity Weekly Briefing October 10-16

  • Companies
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Telefónica Tech

      Cyber Security Weekly Briefing, 27 May – 2 June

      Backdoor discovered in hundreds of Gigabyte motherboards Cybersecurity researchers at Eclypsium discovered a secret backdoor in the firmware of hundreds of Gigabyte motherboard models, a well-known Taiwanese manufacturer. Every time...
    • Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?
      Gonzalo Álvarez Marañón

      Are You Crypto-Agile to Respond Quickly to Changing Cyberthreats?

      A business is considered agile if it is able to respond quickly to market changes, adapt to maintain stability. However, without cryptography there is no security and without security...
      Cyber Security Weekly Briefing January 16-22
      ElevenPaths

      Cyber Security Weekly Briefing January 16-22

      SolarWinds Update New details have been released about the software supply chain compromise unveiled in December. FireEye researchers have published an analysis that puts the focus on the threat actor called...
    • Companies
      • ElevenPaths Team
      • Partners
      • Reports
  • Hacking Area
    • Telefónica Tech

      Cyber Security Weekly Briefing, 19 – 23 June

      Critical vulnerabilities in Asus routers Asus has issued a security advisory addressing a total of nine vulnerabilities affecting multiple router models. Among these security flaws, the one registered as CVE-2022-26376,...
      Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
    • Cyber Security Report
      Telefónica Tech

      Cyber Security Weekly Briefing 11-17 September

      S.O.V.A. – New Android banking trojan Researchers at Threat Fabric have discovered the existence, at least since the beginning of August, of a new banking trojan for Android which they...
      ElevenPaths

      #CyberSecurityPulse: Army Launches Direct Commissioning Program for Civilian Cybersecurity Experts

      The Army has approved a program to recruit experienced cybersecurity experts directly into the service as cyber officers in an attempt to bolster a growing field that military leaders...
    • Hacking Area
      • Cybersecurity Innovation
      • Hacking
      • Malware
  • Cybersecurity for everyone
    • Telefónica Tech

      Cyber Security Weekly Briefing, 12 – 16 June

      Microsoft has fixed more than 70 vulnerabilities in its June Patch Tuesday Microsoft has released its June Patch Tuesday, addressing a number of critical, high, medium and low severity vulnerabilities....
      Travelers waiting at the airport to onboard
      Martiniano Mallavibarrena

      ‘Insiders’ in Cybersecurity: “Catch me if you can”

      Within companies, there is a significant window of opportunity for cybersecurity incidents: disgruntled employees, suppliers, subcontractors...
    • Telefónica Tech

      Cyber Security Weekly Briefing, 28 October – 4 November

      Vulnerabilities fixed in new OpenSSL version  The new 3.0.7 version of OpenSSL, announced last week by the developers of the project, was made public this past Wednesday. The expectation around this...
      Do I Really Need an Antivirus?
      ElevenPaths

      Do I Really Need an Antivirus?

      How can standard users protect themselves? In this article we explain what an antivirus is for and how you can be (more) protected.
    • Cybersecurity for everyone
      • Cybersecurity Advices
      • #MujeresHacker
      • Vulnerabilities

Área: Cyber Security & Cloud

Photo: Matthew Henry / Unsplash
Telefónica Tech

How does a hybrid cloud work?

When it comes to digitalisation and starting the “journey” to the cloud, most companies choose multi-cloud solutions or hybrid clouds as the main technology for safeguarding their databases and...
Telefónica Tech

Cyber Security Weekly Briefing, 18 – 25 November

Exploit for ProxyNotShell vulnerabilities published The first publications about new critical vulnerabilities in Microsoft Exchange Server, CVE-2022-41040 and CVE-2022-41082, which were named ProxyNotShell, were published at the end of September. However,...
Telefónica Tech

Cyber Security Weekly Briefing, 11 – 18 November

Security updates for 35 Cisco vulnerabilities Cisco has released a security update that addresses 35 vulnerabilities in Cisco Adaptive Security Appliance (ASA), Firepower Threat Defense (FTD) and Firepower Management Center...
José Pedro Gómez

A matter of trust: The need for governance and control of a project

Why do I need management figures for the governance of my project? Back in the 13th century, a philosopher once said that an arrow has all the power in itself...
Photo: Berkeley Communications / Unsplash
César Cañada Alonso

Zero trust, a trend in the cyber security environment

Nowadays, the attack surface is larger than before, as there are now more applications, servers, users, etc. in companies. For this reason, it is necessary to limit access, granting...
Photo: Anthony Riera / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 5 – 11 November

Robin Banks Phishing Platform Reactivated Researchers at IronNet have published the second part of their investigation into the Robin Banks phishing-as-a-service platform. The platform was discovered in June this year...
Daniel Sandmeier

Disinformation and fake news: what initiatives do exist to combat them?

The phenomenon of disinformation has been causing concern in European societies, including Spain, for several years now. The I Study on disinformation in Spanish society reveals revealing data such...
Telefónica Tech

Cyber Security Weekly Briefing, 28 October – 4 November

Vulnerabilities fixed in new OpenSSL version  The new 3.0.7 version of OpenSSL, announced last week by the developers of the project, was made public this past Wednesday. The expectation around this...
Martiniano Mallavibarrena

Attention: Data leak! (In search of lost data)

We have been hearing about “data leaks” on a regular basis for years, both in the media and in our professional or even personal environment. The concept actually covers...
Photo: Jenny Ueberberg / Unsplash
Mark Skelton

The Formula for Successful Hybrid Working

Optimising cloud-based technologies and enabling a seamless blend between remote and office work will be the key to hybrid working success. To achieve this, any effective hybrid working formula...

Navegación de entradas

Previous articles
1 … 8 9 10 … 64
More articles
  • Telefónica Tech

Popular

Florence Broderick
New tool: Maltego transforms for Tacyt
If you are a Maltego user, you already know how intuitive and useful it is for researching and analyzing information. You may know as well that Maltego allows to...
Florence Broderick
Quick and dirty script in Powershell to check certificate fingerprints
Malware is using signed binaries to attack Windows systems. Malware needs it to get into the roots of the operative system. So attackers steal or create their own certificates....
Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
New Tool: MicEnum, Mandatory Integrity Control Enumerator
In the context of the Microsoft Windows family of operating systems, Mandatory Integrity Control (MIC) is a core security feature introduced in Windows Vista and implemented in subsequent lines...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration