Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Fleet Optimise for Rent-a-car Companies Deep Learning and satellite images to estimate the impact of COVID19
  • Big Data
    • Big Data and Elections: We shine a light on Trump and Clinton An Artificial Intelligence capable of designing medicines from scratch
  • Cybersecurity
    • When Preventing a Cyberattack Becomes a Vital Decision #CyberSecurityPulse: Guess Riddle… How Is Information Stored In a Bitcoin Address?
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cybersecurity for everyone

Cyber Security Report
Telefónica Tech

Cyber Security Weekly Briefing 11-17 September

S.O.V.A. – New Android banking trojan Researchers at Threat Fabric have discovered the existence, at least since the beginning of August, of a new banking trojan for Android which they...
PackageDNA
Diego Samuel Espitia

PackageDNA Our Development Package Analysis Framework That Made Its Debut at Blackhat

After several months of research and development, during the BlackHat USA 2021 Arsenal event, you saw our deep analysis tool for development packages called PackageDNA, in the talk “Scanning...
D3FEND
David García

D3FEND, the other side of the ATT&CK coin

We are already familiar with the ATT&CK project of the MITRE corporation. It is a de facto standard that helps us to characterise threats based on the techniques and...
Weekly Briefing 4-10 September
Telefónica Tech

Cyber Security Weekly Briefing 4-10 September

Critical vulnerability in Zoho ADSelfService Plus The company Zoho has issued a security advisory warning of a critical vulnerability in ADSelfService Plus, an enterprise password and login management software. The...
Little Red Riding Hood
José Vicente Catalán

What Little Red Riding Hood teaches us about cyber security

They say that a good fairy tale will be considered as such if it has many different readings and is able to convey hundreds of different messages. Little Red...
Cyber Security Weekly Briefing 28 August-3 September
Telefónica Tech

Cyber Security Weekly Briefing 28 August – 3 September

PoC available and scans detected for RCE in Confluence On Wednesday 25 August, Confluence published a security advisory to warn of a vulnerability in Confluence Server and Data Center in versions prior...
Cyber Security Weekly Briefing 14-27 August
Telefónica Tech

Cyber Security Weekly Briefing 14-27 August

Exploitation of vulnerabilities in Exchange ProxyShell​ Security researcher Kevin Beaumont has analyzed the recent massive exploitation of Microsoft Exchange Server vulnerabilities known as ProxyShell. These are a set of flaws revealed by Orange...
Malware Go
David García

The Malware Created in Go Is A Trend And Is Here To Stay

Even though it cannot be said that Go is a new programming language (it is already more than ten years old), it does belong to that new batch of...
Cyber Security Report August
Telefónica Tech

Cyber Security Weekly Briefing 31 July-13 August

Vulnerabilities in DNS-as-a-Service Researchers Shir Tamari and Ami Luttwak, from the security firm Wiz, revealed at the Black Hat security conference multiple vulnerabilities that could affect DNS-as-a-Service (DNSaaS) services. They...
Cyber Securiry Report 2H 21
Innovation and Laboratory Area in ElevenPaths

#CyberSecurityReport21H1: More than 246 million OT cyber security events detected in six months

There are many reports on security trends and summaries, but at Telefónica Tech we want to make a difference. From the Innovation and Lab team, we have just launched...

Navegación de entradas

Previous articles
1 … 11 12 13 … 33
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration