Skip to content
Think Big
Think Big / Business
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Telefónica Tech was Present at Advanced Factories 2021 With Its Proposal For The Industrial Sector Robot Waiters – The future or just a gimmick?
  • Big Data
    • World Environment Day: Green digital transformation as a lever for change Smart Cities: Pushing Open Data with Power BI
  • Cybersecurity
    • #CyberSecurityPulse: The Boom of JavaScript Miners Interpretation and Evolution of MITRE ATT&CK: More “Horizontal” Coverage Doesn’t Mean Better Protection

  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Área: Telefónica Tech

Photo: Matthew Henry / Unsplash
Telefónica Tech

How does a hybrid cloud work?

When it comes to digitalisation and starting the “journey” to the cloud, most companies choose multi-cloud solutions or hybrid clouds as the main technology for safeguarding their databases and...
Telefónica Tech

Cyber Security Weekly Briefing, 18 – 25 November

Exploit for ProxyNotShell vulnerabilities published The first publications about new critical vulnerabilities in Microsoft Exchange Server, CVE-2022-41040 and CVE-2022-41082, which were named ProxyNotShell, were published at the end of September. However,...
Santiago Morante Cendrero

Artificial Intelligence in Fiction: The Circle (2017), by James Ponsoldt

Plot The film The Cricle by James Ponsoldt, based on Dave Eggers‘ novel of the same title, introduces Mae Holland (Emma Watson) as a young intern who joins The Circle...
Marta Nieto Gómez-Elegido

“To be a hacker in life is to be a passionate, talented person who manages to influence the transformation of society”, Carmen Alonso

They say that passion for a profession is forged at an early age. Our parents are our first and most important role models. So, it is not surprising that...
Carlos Martínez Miguel

Three principles for building a reliable Artificial Intelligence

Artificial Intelligence allows machines to learn, both supervised and autonomously. The proliferation of Cloud technologies, the digitalisation of images, texts and audios and the development of IoT (Internet of...
Telefónica Tech

Cyber Security Weekly Briefing, 11 – 18 November

Security updates for 35 Cisco vulnerabilities Cisco has released a security update that addresses 35 vulnerabilities in Cisco Adaptive Security Appliance (ASA), Firepower Threat Defense (FTD) and Firepower Management Center...
José Pedro Gómez

A matter of trust: The need for governance and control of a project

Why do I need management figures for the governance of my project? Back in the 13th century, a philosopher once said that an arrow has all the power in itself...
Daniel García

AI of Things (XII): OEM solutions for the connected car

We recently decided to renew our car at home by switching to a new one that is safer and more efficient. After the purchase process came the long awaited...
Photo: Berkeley Communications / Unsplash
César Cañada Alonso

Zero trust, a trend in the cyber security environment

Nowadays, the attack surface is larger than before, as there are now more applications, servers, users, etc. in companies. For this reason, it is necessary to limit access, granting...
Photo: Anthony Riera / Unsplash
Telefónica Tech

Cyber Security Weekly Briefing, 5 – 11 November

Robin Banks Phishing Platform Reactivated Researchers at IronNet have published the second part of their investigation into the Robin Banks phishing-as-a-service platform. The platform was discovered in June this year...

Navegación de entradas

Previous articles
1 … 11 12 13 … 123
More articles
  • Telefónica Tech

Popular

Florence Broderick
Evil FOCA is now Open Source
We are really happy to announce that Evil FOCA is now Open Source. We have received lots of comments and feedback about how you are using Evil FOCA, or how...
Florence Broderick
How to bypass antiXSS filter in Chrome and Safari (discovered by ElevenPaths)
Modern browsers usually have an antiXSS filter, that protects users from some of the consequences of this kind of attacks. Normally, they block cross site scripting execution, so the...
Florence Broderick
HookMe, a tool for intercepting communications with API hooking
HookMe is a tool for Windows that allows to intercept system processes when calling APIs needed for network connections. The tool, still in beta, was developed by Manuel Fernández (now...
Florence Broderick
How does blacklisting work in Java and how to take advantage of it (using whitelisting)
Oracle has introduced the notion of whitelisting in its latest version of Java 7 update 40. That is a great step ahead (taken too late) in security for this...
Florence Broderick
Quick and dirty shellcode to binary python script
https://google-code-prettify.googlecode.com/svn/loader/run_prettify.js If you work with exploits and shellcode, you already know what shellcode is and how to deal with it. Sometimes it comes with exploits in C, Perl, Python…...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration