Skip to content
Think Big
Countries / Global
  • Global
  • España
  • Ecuador
  • Español
  • Portugues
  • IoT
    • Worker’s Diary IoT II Raspberry Pi for Edge AI: Artificial Intelligence at the Edge for Everyone
  • Big Data
    • Reinforcement learning…. the new player Cloud Computing, the great ally for the digitalisation of the sports sector (and for athletes)
  • Cybersecurity
    • Meet #LadyHacker Karla Parra, Cybersecurity expert at Telefónica Tech What is the Fifth Domain and what is its strategic importance?
Think Big / Business
  • AI of Things
  • Cloud
  • Cybersecurity
  • Blockchain

Cybersecurity for everyone

Cyber Security Report 30 July
Telefónica Tech

Cyber Security Weekly Briefing 24-30 July

PetitPotam: new NTLM relay attack Security researcher Gilles Lionel, also known as Topotam, has discovered a flaw in Windows systems with enabled Active Directory Certificate Services (ADCS) that would allow...
Telefónica Tech

Cyber Security Weekly Briefing 17-23 July

​​​​Global cyber-espionage investigation published A joint consortium of organizations and media outlets has published an investigation revealing the indiscriminate marketing and use of Pegasus spyware. According to the investigators, a...
Cyber Security Weekly Briefing 10-16 July
Telefónica Tech

Cyber Security Weekly Briefing 10-16 July

Kaseya VSA Incident Update After news of the attack by the REvil ransomware group using Kaseya VSA on July 2nd, on Sunday July 11th, Kaseya released the patch for its...
printnightmare
Sergio de los Santos

Frequently Asked Questions About Printnightmare (CVE-2021-34527)

We are going to try to clarify some common doubts about this vulnerability, since it has turned up with some confusing data about whether it was patched or not,...
Cyber Security Weekly Briefing
Telefónica Tech

Cyber Security Weekly Briefing June 19- July 2

New activity of the threat actor Nobelium Microsoft has issued an update on the activities of the Russian threat actor known as Nobelium (aka APT29), which is credited with compromising...
Ransomware cyber security
Sergio de los Santos

What On Earth Is Going on With Ransomware And Why We Won’t Stop It Any Time Soon

In the last few months, it is not rare that every now and then we read about a large company that has fallen victim to ransomware, either brought to...
Cyber Security Weekly Briefing June 19-25
ElevenPaths

Cyber Security Weekly Briefing June 19-25

SonicWall fixes a critical vulnerability that had been partially fixed In October last year, SonicWall fixed a critical buffer overflow vulnerability in SonicOS under the identifier CVE-2020-5135, which affected more than...
cyber security app iotm
Carlos Ávila

IoTM Mobile Applications and The Relevance Of Their Security

Almost a year ago in the article “Internet of Health“ I described how incredible is the amount of applications and devices that the medical industry has deployed and will...
ElevenPaths

DevSecOps: 7 Key Factors for Implementing Security in Devops

DevSecOps, also known as SecDevOps, is a software development philosophy that advocates the adoption of security throughout the software development lifecycle (SDLC). DevSecOps is more than just a specific...
Cyber Security Weekly Briefing June 5-11
ElevenPaths

Cyber Security Weekly Briefing June 5-11

Microsoft’s monthly bulletin Microsoft has released its June security bulletin, which fixes 50 vulnerabilities, including remote code execution (RCE) flaws, denial of service issues, privilege escalation and memory corruption issues....

Navegación de entradas

Previous articles
1 … 12 13 14 … 33
More articles
  • Telefónica Tech

Popular

José Luis Núñez Díaz
Towards a smarter supply chain
One of the recurring use cases that is always mentioned when talking about Blockchain is its application in supply chains. In fact, back in 2018, at Telefónica we were...
ElevenPaths
Mum, I want to be a hacker
The hacker concept is most often associated with male ‘techies’ and ‘geeks’. But why is it so difficult to find female role models in the world of technology? We...
Florence Broderick
ElevenPaths Talks: The ISF Standard of Good Practice for Information Security
REGISTER HERE!   On Thursday, 19 May, our colleague Sebastian will give a speech about The ISF Standard of Good Practice for Information Security. The standard of good practice is...
Florence Broderick
Mobile Connect winner of the 'Connected Life Awards'
Mobile Connect is a multi-operator solution driven by GSMA for universal secure access. The user only needs to link their information to their mobile device solution to have quick...
Florence Broderick
Introducing Mobile Connect – the new standard in digital authentication
The Mobile Operators hold the future of digital authentication in our hands, and so do our customers. The consumers will no longer need to create and manage multiple user...
Think Big
  • Facebook de Telefónica
  • Linkedin de Telefónica
  • Twitter de Telefónica
  • Canal YouTube Telefónica

© Telefónica S.A.

    • Cookies Policy
    • Privacy Policy
    • Accesibility
    • Cookies configuration